<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tom+Conner</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Tom+Conner"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Tom_Conner"/>
		<updated>2026-05-22T13:35:29Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255498</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255498"/>
				<updated>2019-10-16T00:03:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOneLogo.png|link=https://www.hackerone.com/|198x38px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TalaLight.png|link=https://www.talasecurity.io/|163x49px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255497</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255497"/>
				<updated>2019-10-16T00:01:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: Add HackerOne&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOneLogo.png|link=https://www.hackerone.com/|198x38px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;br/&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TalaLight.png|link=https://www.talasecurity.io/|163x49px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255496</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255496"/>
				<updated>2019-10-15T23:55:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TalaLight.png|link=https://www.talasecurity.io/|163x49px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:TalaLight.png&amp;diff=255495</id>
		<title>File:TalaLight.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:TalaLight.png&amp;diff=255495"/>
				<updated>2019-10-15T23:54:52Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255494</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255494"/>
				<updated>2019-10-15T23:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Tala_Background.JPG|link=https://www.talasecurity.io/|140x140px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255493</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255493"/>
				<updated>2019-10-15T23:46:33Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Tala_Background.jpg|link=https://www.talasecurity.io/|140x140px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255492</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255492"/>
				<updated>2019-10-15T23:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: add Tala logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Tala_Background|link=https://www.talasecurity.io/|140x140px|Tala]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Tala_Background.JPG&amp;diff=255491</id>
		<title>File:Tala Background.JPG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Tala_Background.JPG&amp;diff=255491"/>
				<updated>2019-10-15T23:43:25Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255490</id>
		<title>Template:2019 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2019_BASC:Sponsor_Bar_Template&amp;diff=255490"/>
				<updated>2019-10-15T23:41:38Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: add Checkmarx logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
       &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:1280px-NCC Group logo.svg.png|link=https://www.nccgroup.trust/|180x1280px|NCC Group]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Ordr Logo Tag.jpg|link=https://www.ordr.net/|180x1280px|Ordr]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:WhiteHat Primary Logo 2COLOR HIRES.jpg|link=https://www.whitehatsec.com/|180x1280px|WhiteHat]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|150x39px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_Image003.png|link=https://www.checkmarx.com/|153x119px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Netsparker-logo-transparent-h1000px-color.png|link=http://www.netsparker.com//|160x71px|Netsparker]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:SON logo main@2x (1).png|link=https://www.sonatype.com/|240x93px|Sonatype]]&amp;lt;/span&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
  &lt;br /&gt;
         &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|182x58px|Qualys]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Individual Sponsor: Justin Olin&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Checkmarx_Image003.png&amp;diff=255489</id>
		<title>File:Checkmarx Image003.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Checkmarx_Image003.png&amp;diff=255489"/>
				<updated>2019-10-15T23:35:02Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=250748</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=250748"/>
				<updated>2019-04-29T01:19:04Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=Follow @OWASPBOSTON on Twitter. The chapter leader is [mailto:boston@owasp.org Jim Weiler]. The Boston chapter is grateful for support from Constant Contact, Salesforce, Microsoft and Akamai for generously hosting space and their hospitality for various events.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
The Chapter would also like to thank our sponsors for their generous support.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsor ==&lt;br /&gt;
[[File:SIlogostacked.png|Security Innovation|https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:Veracode logo.png|Veracode|https://www.veracode.com/]]&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Boston-Banner-468x60.gif|link=2018_BASC_Homepage]] [[Image:twitter_32.png|link=https://twitter.com/@BASConf]] BASC 2019, the Boston Application Security Conference will take place 8:30am to 6:30pm on Saturday, October 19th at Microsoft, 5 Wayside Road, Burlington, MA.  [[2018 BASC Homepage|Read more]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings --- Our Fifteenth Year ==&lt;br /&gt;
&lt;br /&gt;
We now use [http://www.meetup.com/owaspboston/ meetup] to organize meetings.&lt;br /&gt;
&lt;br /&gt;
We meet whenever a speaker and a venue have available dates,  6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
Upcoming Meetings&lt;br /&gt;
&lt;br /&gt;
 ''January 29th, 2019'' - Cambridge [https://web.securityinnovation.com/owaspboston2019 Partnered with Security Innovation]&lt;br /&gt;
&lt;br /&gt;
Location: [https://goo.gl/maps/w11GUuJJAbo Quick Base office]&lt;br /&gt;
&lt;br /&gt;
5PM- '''Just bring your computer and evil inner-doer and you are ready to roll!'''&lt;br /&gt;
&lt;br /&gt;
Security Innovation is teaming up with OWASP Boston to offer attendees a fun &amp;quot;find the vulnerabilities&amp;quot; game - CMD+CTRL Cyber Range - that shows how hackers break into websites and teaches the importance of secure coding habits.  &lt;br /&gt;
&lt;br /&gt;
The CMD+CTRL Cyber Range we will be using is called ShadowBank, a banking website where players compete to find vulnerabilities, score points, and move up the leaderboard.  Leveraging cheat sheets, attack tables, and expert led training sessions, platers take their shot at stealing money, manipulating share prices, and conducting other nefarious acts.&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Training ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== Past Meetings ===&lt;br /&gt;
 ''June 14th, 2017'' - Burlington [https://www.meetup.com/owaspboston/events/240033562/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
7:00 pm  ''' Is RASP Ready?'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection is overhyped, according to many analysts and pundits. RASP promises applications that protect themselves - which sounds impossible - how can an application possibly protect itself? An agent that sits inside the app sounds like a deployment nightmare at worst, and a drain on the app at best. What’s the reality? Where are we now and what have we learned? &lt;br /&gt;
&lt;br /&gt;
We’ve seen deployment successes and failures, and we will draw from those specific experiences to describe: &lt;br /&gt;
Where does RASP work? &lt;br /&gt;
* What applications are well-suited for RASP? &lt;br /&gt;
* What types (organizational structure, culture, or skillset) of organizations are well-suited for RASP?&lt;br /&gt;
&lt;br /&gt;
What is the reality of RASP? &lt;br /&gt;
* Is RASP a deployment model or a feature set? &lt;br /&gt;
* How mature is RASP? Is it an over-hyped immature space, enterprise-ready, or somewhere in between? &lt;br /&gt;
* Which RASP capabilities do organizations use? And how do they validate those capabilities in their own environments? &lt;br /&gt;
* Can RASP replace the WAF?&lt;br /&gt;
&lt;br /&gt;
We will conclude, not with a sales pitch, but some lessons learned on: the three must have attributes for RASP, some suggestions on good candidates for RASP – both types of teams and types of applications, and finally - if, how, and when to get started. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Michael Feiertag, CEO and Co-Founder, tCell &lt;br /&gt;
Before co-founding tCell at the end of 2014, Michael led a string of successful products – most recently as head of products at Okta, and prior to that, as technology director at Blue Coat. Prior to Blue Coat, Michael held product management, engineering, and sales positions at several start-ups. Michael holds a B.S. from The University of Chicago, and an M.S. from the University of Maryland&lt;br /&gt;
&lt;br /&gt;
 '''May 2, 2017''' - Burlington [https://www.meetup.com/owaspboston/events/239130768/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
6:50 pm  '''Random Number Generation - Lava Lamps, Clouds, New Standards and the IoT - Richard Moulds'''&lt;br /&gt;
&lt;br /&gt;
The SANS Institute recently listed &amp;quot;Weak random number generators&amp;quot; as one of the 7 most dangerous security techniques to watch in 2017. But how do you really know how good your random numbers are? Virtualization and IoT make things worse and new standards are a wake-up call. Random numbers are the basis of security for all cryptography, yet they are often taken for granted. Without entropy, crypto is just math.  &lt;br /&gt;
&lt;br /&gt;
Learn why random numbers are so hard to generate and validate, compare different technologies in use today across virtualized environments, and discuss operational steps to take the risk out of random numbers and help secure cryptosystems even into the era of quantum computers. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Richard Moulds, General Manager of Whitewood Security, has spoken at RSA 2017 and at several OWASP chapter events in New York, Chicago and Austin. Richard has over 20 years of experience in the area of cryptography and encryption.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2, 2016''' - Cambridge [https://www.meetup.com/owaspboston/events/234648485/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 90 Broadway, Cambridge, MA 02142 (down the street from the usual location)&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
7:00 '&amp;lt;nowiki/&amp;gt;''Advanced Persistent Legal Threats''' - '''''&amp;lt;nowiki/&amp;gt;'''William Gamble, JD, LLM, EMBA'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Good cyber security can protect IT infrastructure against many attacks. Because of the difficulty in monetizing cyber thefts, the direct loss of a breach can be limited. However, the legal costs, both from government agencies and plaintiffs, can be far greater. The legal landscape, both in the US and internationally is changing as fast if not faster than the technology.&lt;br /&gt;
&lt;br /&gt;
Bio: I am a lawyer and a member of the Florida Bar.I used to practice tax, securities and banking law. I have written three books and spoken around the world on the economic efficiency of legal and regulatory infrastructures specifically in emerging markets like China. Over the past two years, I have immersed myself in cyber security. I now hold the CompTIA A+, Network+, and Security+. I will take the CASP next month. Besides keeping up with the regulations, I am studying incident response and auditing. I am also working toward my health care law certification. My hero is Dr. Johannes Ullrich.&lt;br /&gt;
&lt;br /&gt;
 '''September 28, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/233921522/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
6:15 '''OWASP Top 10 #1 - Injection Flaws'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss XML External Entity Injection flaws; how it works, how to prevent, code examples.&lt;br /&gt;
&lt;br /&gt;
6:45 '&amp;lt;nowiki/&amp;gt;''From the Frontlines of RASP Adoption''' - '''''&amp;lt;nowiki/&amp;gt;'''Goran Begic, VP of Product, IMMUNIO'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection (RASP) is one of the newest technologies coined by Gartner and it is in early stages of adoption in the industry. It promises dynamic defense and automatic mitigation of vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
This presentation is a summary of experiences from several dozens of commercial evaluations and early adoptions in production that took place this year and provides some examples of situations and challenges that are not specific to any individual vendor. In this talk Goran will provide an overview of buying criteria and evaluation requirements across different industries and some typical pitfalls that can slow down adoption.&lt;br /&gt;
&lt;br /&gt;
After the introduction and a brief reminder on the technology Goran will invite audience to participate in discussion about organizational requirements for adoption and operationalization of RASP. &lt;br /&gt;
&lt;br /&gt;
Questions for discussion: &lt;br /&gt;
&lt;br /&gt;
My application is under attack. &lt;br /&gt;
*What actions should I take? &lt;br /&gt;
*Who owns the response? &lt;br /&gt;
*Which attacks should I respond to and which ones can I ignore?&lt;br /&gt;
*How to get started with mitigation provided by technology? &lt;br /&gt;
*Does RASP fit with DevOps? &lt;br /&gt;
*Does RASP help with remediation? &lt;br /&gt;
&lt;br /&gt;
What this presentation is not: This is not a product pitch in any way. Evaluation criteria, comparison of RASP with IAST and other security technologies, personal experiences and examples discussed in this talk are generally applicable to all RASP solutions. &lt;br /&gt;
&lt;br /&gt;
Key takeaways:&lt;br /&gt;
&lt;br /&gt;
At the end of the presentation you will: &lt;br /&gt;
*get a better understanding of requirements for evaluation of RASP and its use cases, &lt;br /&gt;
*if you can pull a successful evaluation alone, or if you will need participation of other groups / teams &lt;br /&gt;
*learn about critical criteria for success of RASP in production &lt;br /&gt;
*how this criteria different relative to appsec testing tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 7, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Docker Containers and Application Security''' - '''Tsvi Korren'''&lt;br /&gt;
&lt;br /&gt;
Docker containers are transforming the way applications are developed and deployed. Closely tied to DevOps and Continuous Delivery, containers introduce both risks and opportunities to security management in Web applications. This talk will introduce the basic concepts of containers, how companies use them today and how to support this technology while elevating the security posture of your application stacks.&lt;br /&gt;
&lt;br /&gt;
Tsvi Korren, CISSP, has been an enterprise IT professional for 20 years with background in business process consulting in large organizations. Most recently at CA Technologies, he worked across verticals in government, retail, financial institutions and healthcare to implement compliance and security processes, from Identity and Access to Host and Server Controls. Tsvi is currently the director of technical services at Aqua, concentrating on building bridges between DevOps and Security.&lt;br /&gt;
&lt;br /&gt;
 '''June 8, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/230842887/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6-6:30 '''News, announcements, job postings, etc. '''&lt;br /&gt;
&lt;br /&gt;
6:30-7 '''Introduction to SQL Injection - Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Computer Science Curricula’s Failure - What Should We Do Now?''' - '''Ming Chow &amp;amp; Roy Wattanasin'''&lt;br /&gt;
&lt;br /&gt;
We are still facing the same security vulnerabilities from over a decade ago. The problems are not going away anytime soon and a reason is because Computer Science curricula are still churning out students who are not even exposed to security. This talk will address the lack of emphasis on information security in Computer Science curricula, how CS curricula have an obligation, how to gradually fix the problem by integrating security into many Computer Science undergraduate and graduate classes, and success stories from students. This talk will also discuss what Tufts and Brandeis are currently working on to further address the security education problem by creating a joint cyber security and policy program that spans multiple departments. Additional points and feedback from the audience are encouraged to help with the issue. All are encourage to attend to submit your feedback to help!&lt;br /&gt;
&lt;br /&gt;
Presenters: &lt;br /&gt;
&lt;br /&gt;
Ming Chow - @0xmchow &lt;br /&gt;
&lt;br /&gt;
Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He was a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World, DEF CON, Intel, SOURCE Conference, and BSides Boston. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2014 and 2015.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin - @wr0 &lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin is an adjunct faculty at Brandeis University in both the Health and Medical Informatics and Information Security graduate programs. He spends most of his time leading, teaching and developing information security programs, finding vulnerabilities, performing incident response and working on many projects. Roy has spoken at many conferences including RSA, ISSA International, Source Conference, Braintank, Cyber Security World, OWASP and the Security BSides conferences. He is also a healthcare information security professional. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2015. &lt;br /&gt;
&lt;br /&gt;
 '''May 4, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229788205/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Slightly different [http://www.akamai.com/html/about/locations.html Akamai] location: 90 Broadway, Cambridge, MA 02142 between Meadhall and the Mariott&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP''' - '''Dan Cornell'''&lt;br /&gt;
&lt;br /&gt;
There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.&lt;br /&gt;
&lt;br /&gt;
This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell is a globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application security program management platform. Cornell was Principal Investigator as Denim Group researched and developed the Hybrid Analysis Mapping (HAM) technology that lies at the heart of ThreadFix, through a Small Business Innovation Research (SBIR) contract with the Department of Homeland Security's Science and Technology Directorate.&lt;br /&gt;
&lt;br /&gt;
More information at: http://www.denimgroup.com/about_team_dan.html&lt;br /&gt;
&lt;br /&gt;
 '''April 6, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Runtime Application Self-Protection (RASP) Tools''' - '''Kunal Anand'''&lt;br /&gt;
&lt;br /&gt;
This talk will highlight the latest in AppSec and dive into a different kind of solution called Runtime Application Self-Protection (RASP). We'll also explore a new methodology called language theoretic security (LANGSEC) and explain how it can outperform existing approaches like pattern matching, regular expressions, etc. This talk will lay the foundation via informal and formal theory how lexers, tokenizers and parsers work. We’ll move onto constructing an open source toolchain to analyzing data and exploring interactive data visualizations. Along the way, we’ll cover performance tradeoffs and discuss the challenges of modern application security.&lt;br /&gt;
&lt;br /&gt;
Kunal Anand is the co-founder and CTO of Prevoty, a runtime application security platform. Prior to that, he was the Director of Technology at the BBC Worldwide, overseeing engineering and operations across the company’s global Digital Entertainment and Gaming initiatives. Kunal also has several years of experience leading security, data and engineering at Gravity, MySpace and NASA’s JetPropulsion Laboratory. His work has been featured in Wired Magazine and Fast Company. Kunal received a B.S. from Babson College.&lt;br /&gt;
&lt;br /&gt;
=== Past Training ===&lt;br /&gt;
&lt;br /&gt;
 '''March 16, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/229156529/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Demandware, Burlington.&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
6:30 '''Software Security by the Numbers''' - '''Chris Eng'''&lt;br /&gt;
&lt;br /&gt;
Deep dive into data we’ve collected about the state of software security in 2016 &lt;br /&gt;
* Based on scans of 200,000+ applications over an 18-month period &lt;br /&gt;
* How different industries and programming languages compare to one another &lt;br /&gt;
* Vulnerability remediation habits and patterns &lt;br /&gt;
* Three characteristics of a successful AppSec program &lt;br /&gt;
&lt;br /&gt;
Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies. Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.&lt;br /&gt;
&lt;br /&gt;
 '''January 26, 2016''' - Waltham - [http://www.meetup.com/owaspboston/events/228202040/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Waltham.  Trapelo Rd. exit from Rt. 128, toward Lincoln. The parking lot entrance is on the right, at the first traffic light. Drive around to the front of the office complex, facing the highway. Enter under the clock tower. Park in the front of the building and enter in the main building lobby, continue down the hallway and you will see the innovation center, enter in the large glass doors. &lt;br /&gt;
&lt;br /&gt;
7:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:20 '''What Security Testing Tools Miss'''&lt;br /&gt;
&lt;br /&gt;
Black Duck Software presents - Static analysis, dynamic analysis, and other testing tools are all essential weapons against adversaries.  But for the 80%+ of companies worldwide that use open source software in their application development these tools are ineffective in identifying and mitigating open source security risks . This presentation will cover:&lt;br /&gt;
&lt;br /&gt;
The value of static and dynamic tools, and where they best fit in the Secure Development Lifecycle          &lt;br /&gt;
&lt;br /&gt;
Why these tools are not useful in identifying known vulnerabilities in open source components          &lt;br /&gt;
&lt;br /&gt;
Controls development and security professionals can deploy to select, detect, manage and monitor open source for existing and newly disclosed vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Food will be provided by Constant Contact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2015''' - Cambridge - [http://www.meetup.com/owaspboston/events/226394218/ Meetup]&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway &lt;br /&gt;
Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
Attendee interaction is always mentioned as a high value at meetings and was great at the MetroWest meetings, so we're doing that at Akamai this month. Some discussion starters so far: SSL certificate impacts from CA/Browser alliance decisions and SHA1 weakness; mutual (client) SSL, javascript client and server side; what the heck is threat intelligence, dev ops and faster secure SDLC.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Metrowest&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 20, 7:00 pm&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Innovation Center, Reservoir Place, 1601 Trapelo Road, Waltham, MA 02451&lt;br /&gt;
&lt;br /&gt;
7:00 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:30 '''Access in Maliceland - Risk Based Access Control''' - '''Gunnar Peterson'''&lt;br /&gt;
&lt;br /&gt;
John Lambert observed attackers win because while defenders think in lists, attackers think in graphs. Access control systems divide the system a priori into secure and insecure states. But that’s only worth the paper its printed on. A  Attackers see the system as it is, for attackers, the access control scheme is the beginning of the game not the end. Determined attackers seek out access control models and then find holes that they can leverage. Access control systems that purport to protect the system are built on assumptions from which reality diverges. Application security needs a new approach to access control- adding feedback loops for risk based decisions,  fine-grained, dynamic access control. &lt;br /&gt;
&lt;br /&gt;
Security is a business with a very long list of issues and requirements. The spreadsheets are miles long. This makes it essential to find reusable solution patterns that can address multiple problems.This presentation looks at both medium term improvements and code examples to improve access control decisions and overall security today&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson ([https://twitter.com/oneraindrop @oneraindrop]) focuses on security architecture consulting and training. Experience includes Associate Editor for IEEE Security &amp;amp; Privacy Journal, a Microsoft MVP for App security, an IANS Research Faculty member, a Securosis Contributing Analyst, and a Visiting Scientist at Carnegie Mellon Software Engineering Institute. He maintains a popular information security blog at http://1raindrop.typepad.com.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Cambridge&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 8, 6:30 pm  ''NOTE: It's the second Wednesday this month.''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
 '''June 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Put Down the Megaphone: Effective Security Advocacy Without the Shouting''' - '''Darren Meyer'''&lt;br /&gt;
&lt;br /&gt;
10 years’ experience in the InfoSec community--including work with organizations in many verticals, in sizes ranging from startups to Fortune 50 enterprises, leading Application Security teams, building and delivering security instruction to developers, managers, and InfoSec professionals—has taught me the importance of crafting advocacy for different audiences. In this talk, I share my experiences in learning to be an effective advocate with three key audiences: developers, management, and non-technical staff.&lt;br /&gt;
&lt;br /&gt;
Darren is an Application Security advocate and researcher, technology hobbyist, and maker. He loves to learn, teach, nerd out, and inflict terrible puns on people. His background includes logistics, software development, and an assortment of information security roles including leading AppSec programs and professional security instruction targeting developers, managers, and InfoSec professionals.&lt;br /&gt;
&lt;br /&gt;
 '''May 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How the crowd is discovering critical vulns missed by traditional methods''' - '''Leif Dreizler'''&lt;br /&gt;
&lt;br /&gt;
State of the art security programs are turning to bug bounties to leverage a vast array of skill-sets and knowledge. Learn why these programs work, when to deploy them, and how you can bring these new application security testing capabilities into your own organization. The speaker will discuss real world examples from bug bounties and focus on cases where business logic flaws and high priority vulnerabilities were found ... even with existing security testing processes in place. &lt;br /&gt;
&lt;br /&gt;
Attendees will learn:&lt;br /&gt;
&lt;br /&gt;
Testing methods deployed by our crowd that help them find bugs the scanners miss&lt;br /&gt;
&lt;br /&gt;
Examples of the high quality of bugs our crowd is finding, including P1'sTrends which vulnerability types are found most often and whyWhat is the ROI on the pay for performance modelWhere does the SDLC merge into crowdsourced testing&lt;br /&gt;
&lt;br /&gt;
Leif Dreizler is a Senior Security Engineer at Bugcrowd, the innovator in crowdsourced security testing for the enterprise. Prior to joining Bugcrowd, Leif was a Senior Application Security Engineer at Redspin, performing application security assessments. During his time at Redspin he also served as the Application Team Lead, liaising with clients at the engineering and sales level. He has also made minor contributions to the Firebug project. Leif attended the University of California, Santa Barbara where he studied Computer Science. Leif recently spoke to the NYC Security Meet-up group.&lt;br /&gt;
&lt;br /&gt;
 '''April 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler Will show some actual examples and patterns of SQL Injection attempts&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Are You An Imposter? Me too!''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
Many people in the information security field feel like a fraud, or an imposter. In reality, we often know far more, and are capable of far more than we believe we do. There is so much to know and we constantly hear about the latest groundbreaking research done by others, which makes us feel less important or worthy. Let’s talk about what Imposter Syndrome is, its prevalence, and then we can start to realize just how capable we are and go forward with the confidence in the field.&lt;br /&gt;
&lt;br /&gt;
 '''March 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, March 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Prioritizing Web Application Vulnerabilities – A Hacker’s Perspective''' - '''Nick Silver'''&lt;br /&gt;
&lt;br /&gt;
The best application risk models capture not only the technical risk factors, but also the business context in which an asset lives.  Traditionally, this is done by auditing application owners on an array of questions in order to properly classify the asset and its data – but that takes time which could be better spent elsewhere.  We interviewed dozens of hackers and asked them which vulnerabilities they would look for first depending on the type of attack they wanted to carry out.  We’ll walk through several examples of how to use this data as a shortcut means for prioritizing risk without the need for any pesky audit questionnaires.&lt;br /&gt;
&lt;br /&gt;
Nick Silver is a Senior Solutions Architect with WhiteHat Security.  He is responsible for translating business requirements into technical ones and assisting businesses in implementing web security programs.  Previously, Nick led a team in WhiteHat’s Threat Research Center where they were responsible for testing more than 2,000 of their customers’ websites for vulnerabilities.  &lt;br /&gt;
&lt;br /&gt;
 '''February 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, announcements''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Incident Response and Web Application Security - Stories from the Trenches''' - '''Fred House and Joe Ceirante'''&lt;br /&gt;
&lt;br /&gt;
Mandiant has conducted numerous incident response engagements throughout its history, including a record number of 200 incidents in 2014. Mandiant consultants Fred House and Joe Ceirante will discuss case studies and trends Mandiant has observed in relation to web application security.&lt;br /&gt;
 &lt;br /&gt;
Topics will include the types of threat actors that target web applications, the techniques they use to compromise web applications, and the activities they perform once inside the network. Techniques for detecting and mitigating web compromises will also be reviewed. All content will be derived from the real-world compromises that Mandiant has investigated.&lt;br /&gt;
&lt;br /&gt;
 '''January 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 7, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, risk analysis of Poodle''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How a Hacker Views Your Web Site''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
''The most popular presentation of BASC 2014''&lt;br /&gt;
&lt;br /&gt;
As defenders, we have to be right 100% of the time where an attacker only needs to be right once. The attack surface of a modern web site is incredibly large and we need to be aware of all of it. Additionally, individual attacks may not always be effective but sometimes using them together can gain the desired effect. In this talk, we’ll take a look at the whole attack surface for a typical web site and the various ways that an attacker will use to compromise a site.&lt;br /&gt;
&lt;br /&gt;
 '''December 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, December 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News and Views You Can Use and Abuse''' - '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
* Some thoughts and analysis on some current app security news and other stuff&lt;br /&gt;
* Adobe password breach&lt;br /&gt;
* Reducing Web Application Firewall SQL injection false positives&lt;br /&gt;
 &lt;br /&gt;
7:15 '''Swift and Security''' - '''Ming Chow'''&lt;br /&gt;
 &lt;br /&gt;
Apple is pushing its new programming language Swift for iOS development and for many good reasons.  This talk will discuss what the language has right in terms of security, the old and new security pitfalls, and what developers need to be aware of moving forward with using the new language.  The fact to the matter is, iOS isn't going away, iOS developers will need to learn and use Swift, and there will be a big rush of Swift-based apps: we might as well learn how to do it right the first time around.&lt;br /&gt;
 &lt;br /&gt;
Ming Chow is an Instructor at the Department of Computer Science, Tufts University. Ten years of web development experience.&lt;br /&gt;
Specialties: Web and Mobile Development, Web and Mobile Security&lt;br /&gt;
&lt;br /&gt;
 '''July 2014'''&lt;br /&gt;
&lt;br /&gt;
Topics: '''Grails Security''' and '''Validating Cross-Site Scripting Vulns with xssValidator'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Cyrus Malekpour''' and '''John Poulin'''&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic 1: ''Grails Security''&lt;br /&gt;
&lt;br /&gt;
Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.&lt;br /&gt;
 &lt;br /&gt;
Cyrus Malekpour (@cmalekpour) is currently interning at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development. &lt;br /&gt;
 &lt;br /&gt;
Topic 2: ''Validating Cross-Site Scripting Vulns with xssValidator''&lt;br /&gt;
 &lt;br /&gt;
xssValidator is a tool developed to automate the testing and validation of Cross-Site Scripting (xss) vulnerabilities within web applications. Automated scanners tend to report large amounts of false-positives, and as consultants we're forced spending our time trying to verify these findings. xssValidator leverages scriptable web-browsers such as PhantomJS and Slimer.js to automatically validate these findings.&lt;br /&gt;
 &lt;br /&gt;
John Poulin is an application security consultant for nVisium who specializes in web application security. He worked previously as a web developer and software engineer that focused on building multi-tier web applications. When he's not hacking on web apps, John spends his time building tools to help him hack on web apps! You can find him on twitter: @forced_request and on myspace: REDACTED.&lt;br /&gt;
&lt;br /&gt;
 '''June 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection and the OWASP Zed Attack Proxy (ZAP)'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Rob Cheyne and Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 - general networking, news discussion, announcements.&lt;br /&gt;
&lt;br /&gt;
7:00 - main presentations&lt;br /&gt;
&lt;br /&gt;
The June 4th meeting will be the second in our series of 2014 training meetings. Rob Cheyne will continue explaining and exploring SQL Injection by conducting an actual injection attack.&lt;br /&gt;
&lt;br /&gt;
This will be a demo-based discussion to get into the mindset of an attacker, and show how an attacker goes after a site. Demo will include: &lt;br /&gt;
&lt;br /&gt;
* BurpProxy demo &lt;br /&gt;
* Common authentication flaws &lt;br /&gt;
* SQL Injection Demo that shows the process and how it builds to a full compromise&lt;br /&gt;
&lt;br /&gt;
'''Rob Cheyne''' is currently CEO of Big Brain Security. In addition to security consulting for Fortune 500 customers, he was the author of LC4, a version of the award-winning L0phtCrack password auditing tool, and he also worked on the code scanning technology that was eventually spun off as Veracode. Rob was at @stake from the very first customer all the way through to the $50M acquisition by Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Jim Weiler''' will introduce the OWASP Zed Attack Proxy (ZAP). This is a very powerful free OWASP intercepting proxy that lets you see, analyze, change, replay etc. every browser request and response, analyze your session, scan and attack web sites, save the results and run reports. We can't cover all the functionality but we'll show some practical tips and techniques.&lt;br /&gt;
&lt;br /&gt;
Pizza, salad and soda courtesy of Akamai&lt;br /&gt;
&lt;br /&gt;
 '''March 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection, WebGoat, Cross Site Request Forgery'''&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
When: Wednesday, March 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
There will be three training sessions:&lt;br /&gt;
&lt;br /&gt;
One will be on SQL Injection - intro, detection, prevention, scanning and false positives. This is the most serious web application vulnerability.&lt;br /&gt;
&lt;br /&gt;
The second will be on OWASP WebGoat. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE or in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. There are hints and 39 different lesson plans on various vulnerabilities and technologies. We won't cover all of them of course!&lt;br /&gt;
&lt;br /&gt;
The third will be on Cross Site Request Forgery - not a hack really, it's just the way the web works. But it causes apps to do legitimate things that you didn't ask them to do.&lt;br /&gt;
&lt;br /&gt;
Pizza and drinks provided by Akamai.&lt;br /&gt;
&lt;br /&gt;
 '''January 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''JavaScript Verification: From Browsers to Pages'''&lt;br /&gt;
&lt;br /&gt;
Modern web browsers implement a &amp;quot;private browsing&amp;quot; mode that is intended to leave behind no traces of a user's browsing activity on their computer. This feature is in direct tension with support for *extensions*, which let users add third-party functionality into their browser. I will discuss the scope of this problem, present our approach to verifying extensions' compliance with private browsing mode, and sketch our findings on several real, third-party extensions. I will then briefly describe the toolkit underlying our approach, and end with a sketch of a newer project, adapting this approach to the very different-seeming problem of statically catching errors when using the jQuery library.&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
&lt;br /&gt;
Benjamin Lerner has just completed a post-doctoral research position in the PLT group at Brown University, and is now a lecturer at Northeastern University.  His research examines the challenges of analyzing client-side web programming, from the behavior of web pages down through the semantics of the browser.  He received a PhD in Computer Science from the University of Washington in 2011, building a platform to analyze conflicts between browser extensions, and a B.S. in Computer Science and Mathematics from Yale University.&lt;br /&gt;
&lt;br /&gt;
 '''November 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Attacking iOS Applications'''  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://www.slideshare.net/kfosaaen/i-os-gcandpb On slideshare]&lt;br /&gt;
&lt;br /&gt;
This presentation will cover the basics of attacking iOS applications (and their back ends) using a web proxy to intercept, modify, and repeat HTTP/HTTPS requests. (The proxy used during research was Burp; however, any HTTP intercepting proxy such as OWASP ZAP could be used) From setting up the proxy to pulling data from the backend systems, this talk will be a great primer for anyone interested in testing iOS applications at the HTTP protocol level. There will be a short (2 minute) primer on setting up the intercepting proxy, followed by three practical examples showing how to intercept data headed to the phone, how to modify data heading to the application server, and how to pull extra data from application servers to further an attack. All of these examples will focus on native iOS apps (Game Center and Passbook) and/or functionality (Passbook Passes).&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Karl Fosaaen'''&lt;br /&gt;
&lt;br /&gt;
Karl is a senior security consultant at NetSPI. This role has allowed Karl to work in a variety of industries, including financial services, health care, and hardware manufacturing. Karl specializes in network and web application penetration testing. In his spare time, Karl helps out as an OPER at THOTCON and a swag goon at DEF CON.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, October 2, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Abusing NoSQL Databases'''&lt;br /&gt;
&lt;br /&gt;
The days of selecting from a few SQL database options for an application are over. There is now a plethora of NoSQL database options to choose from: some are better than others for certain jobs. There are good reasons why developers are choosing them over traditional SQL databases including performance, scalabiltiy, and ease-of-use. Unfortunately like for many hot techologies, security is largely an afterthought in NoSQL databases. This short but concise presentation will illustrate how poor the quality of security in many NoSQL database systems is. This presentation will not be confined to one particular NoSQL database system. Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, encryption; and those that affect specific NoSQL database systems such as MongoDB and CouchDB. The ideas that we now have a complicated heterogeneous problem and that defense-in-depth is even more necessary will be stressed. There is a common misconception that SQL injection attacks are eliminated by using a NoSQL database system. While specifically SQL injection is largely eliminated, injection attack vectors have increased thanks to JavaScript and the flexibility of NoSQL databases. This presentation will present and demo new classes of injection attacks. Attendees should be familiar with JavaScript and JSON. &lt;br /&gt;
&lt;br /&gt;
Presenter: '''Ming Chow'''&lt;br /&gt;
&lt;br /&gt;
Ming Chow (@tufts_cs_mchow) is a Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He teaches courses largely in the undergraduate curriculum including the second course in the major sequence, Web Programming, Music Apps on the iPad, and Introduction to Computer Security. He was also a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World (2011 and 2012), DEF CON 19 (2011), the Design Automation Conference (2011), Intel, and the SOURCE Conference (Boston 2013). Ming's projects in information security include building numerous CTF challenges, Internet investigations, HTML5 and JavaScript security, and Android forensics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2013 - Joint Meeting with [http://www.meetup.com/Boston-cloud-services/ Boston Cloud Services]''' &lt;br /&gt;
&lt;br /&gt;
When: Tuesday, September 10, 6 pm&lt;br /&gt;
&lt;br /&gt;
Location: Microsoft NERD Center ''(not our usual location)''&lt;br /&gt;
&lt;br /&gt;
'''Note: This is a joint meeting. Please register at [http://www.meetup.com/Boston-cloud-services/ the Boston Cloud Services meetup page] if you plan to attend.'''&lt;br /&gt;
&lt;br /&gt;
There will be two presentations at this meeting:&lt;br /&gt;
&lt;br /&gt;
Topic: '''People Centric Security (PCS)'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Nick Stamos'''&lt;br /&gt;
&lt;br /&gt;
People Centric Security (PCS) is a new security model, presented as part of Gartner's Maverick Research 2 year ago. PCS is well suited for Cloud Business/Consumer services such as Dropbox, Google Drive, SkyDrive, etc. PCS enables users to have what they desire, and provides enterprises what they require for data governance and compliance. Nick Stamos co-founded his fourth company, nCrypted Cloud in July of 2012. His past startups include Verdasys, Phase Forward (IPO FY2004, $685M Oracle Acquisition 2010), and Amulet. He studied at Tufts University where he received a BSEE and MSEE.&lt;br /&gt;
&lt;br /&gt;
Topic: '''SSL Certs'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
Practical experiences with issuing and risk assessing SSL certs for enterprise applications on a cloud provider: who creates the CSR, how do you protect the private key on the cloud server, certs on cloud provider managed load balancers vrs 3rd party managed app servers, roles and responsibilities of cloud IT, 3rd party developer IT, enterprise IT and service providers. Jim Weiler is Application Security Architect at Starwoods Hotels and the Chapter Leader of OWASP Boston.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2013 - Doubleheader!'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 10, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Topic: '''RailsGoat'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
Abstract: While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. [http://railsgoat.cktricky.com/ RailsGoat] is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.&lt;br /&gt;
&lt;br /&gt;
Topic: '''PhoneGap on Android'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PhoneGap is a widely used framework that allows developers to rapidly build cross-platform mobile applications using HTML5, JavaScript, and CSS. Using PhoneGap plugins, developers can call native platform APIs from browser-like applications using JavaScript. This approach introduces vulnerabilities that are not typically as prevalent within native Android applications, warranting a fresh look at the way we view mobile applications. In this presentation, we will take a deep look at the Android implementation of the framework and we will examine the overall attack surface for applications. Real-world examples of vulnerable applications will be demonstrated as well in order to provide context, entertainment, and enjoyment.&lt;br /&gt;
&lt;br /&gt;
About the Speakers:&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''We see the future…and it isn’t pretty'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Andrea Mulligan, Sr. Director at Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future. &lt;br /&gt;
&lt;br /&gt;
 '''May 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Systems Thinking + Web Security'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Akamai'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Akamai will present on ‘Systems Thinking + Web Security’. There will also be an audience review exercise facilitated by the Akamai presenters.  This is a great chance to hear some interesting perspectives on web security from Akamai, who handles about one third of all internet traffic.&lt;br /&gt;
&lt;br /&gt;
 '''April 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Sonotype'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
* Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important. &lt;br /&gt;
* Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.&lt;br /&gt;
* OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are. &lt;br /&gt;
* OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.&lt;br /&gt;
* OSS Component Policy Examples&lt;br /&gt;
* Example Application Compositions Reports&lt;br /&gt;
* Example Use cases IDE, CI, repository, production applications&lt;br /&gt;
* Discussion&lt;br /&gt;
&lt;br /&gt;
About Sonatype:&lt;br /&gt;
&lt;br /&gt;
Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository. &lt;br /&gt;
&lt;br /&gt;
 '''March 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''What is BSIMM?'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Nabil Hannan'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.&lt;br /&gt;
 &lt;br /&gt;
The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.  &lt;br /&gt;
&lt;br /&gt;
BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers. &lt;br /&gt;
&lt;br /&gt;
The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''BroBot'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Eric Kobrin, Akamai'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.&lt;br /&gt;
 &lt;br /&gt;
His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:&lt;br /&gt;
&lt;br /&gt;
* Vulnerable system discovery&lt;br /&gt;
* Zombie compromise&lt;br /&gt;
* Control structure&lt;br /&gt;
* Attack traffic&lt;br /&gt;
* Mitigation steps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Third-Party Application Analysis: Best Practices and Lessons Learned'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Chad Holmes, Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.&lt;br /&gt;
&lt;br /&gt;
The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some.  The order of the presentation is:&lt;br /&gt;
&lt;br /&gt;
·         Adoption rates of externally developed software&lt;br /&gt;
&lt;br /&gt;
·         The risk within those apps&lt;br /&gt;
&lt;br /&gt;
·         Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)&lt;br /&gt;
&lt;br /&gt;
·         Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)&lt;br /&gt;
&lt;br /&gt;
·         Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)&lt;br /&gt;
&lt;br /&gt;
·         Best Practices for high rates of adoption&lt;br /&gt;
&lt;br /&gt;
·         Lessons Learned and Recommendations&lt;br /&gt;
&lt;br /&gt;
Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.&lt;br /&gt;
&lt;br /&gt;
 '''June 2012'''&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker '''Will Vandevanter - Rapid 7'''&lt;br /&gt;
&lt;br /&gt;
'''Fingerprinting web applications of all kinds'''&lt;br /&gt;
&lt;br /&gt;
This turbo talk will introduce a new Metasploit module that fingerprints &amp;quot;known&amp;quot; web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others. &lt;br /&gt;
&lt;br /&gt;
Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 '''May 31 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Jobspring, Boston. 545 Boylston st. &lt;br /&gt;
&lt;br /&gt;
Speaker - '''Glenn Gramling, Vice President, Cenzic'''&lt;br /&gt;
&lt;br /&gt;
“Cloudy with a Chance of Hack”&lt;br /&gt;
&lt;br /&gt;
Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of &amp;quot;stormy weather.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Glenn Gramling is responsible for global sales and business development for Cenzic’s  application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 11, 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker - '''David Eoff, Senior Product Marketing Manager, HP Enterprise Security'''&lt;br /&gt;
&lt;br /&gt;
David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.&lt;br /&gt;
&lt;br /&gt;
Topic - '''Gray, the New Black:  Gray-Box Vulnerability Testing'''&lt;br /&gt;
&lt;br /&gt;
Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software:  Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST).  While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions:  information about the inner workings and behavior of applications undergoing DAST and SAST analysis.&lt;br /&gt;
 &lt;br /&gt;
This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers.  It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.&lt;br /&gt;
&lt;br /&gt;
 '''March 8, 2012, with the Boston Security Meetup group'''&lt;br /&gt;
&lt;br /&gt;
Location - [http://maps.google.com/maps?q=Jobspring+Partners,+Boylston+Street,+Boston,+MA&amp;amp;hl=en&amp;amp;sll=42.362243,-71.081628&amp;amp;sspn=0.019549,0.037594&amp;amp;oq=jobspring&amp;amp;t=v&amp;amp;hq=Jobspring+Partners,&amp;amp;hnear=Boylston+St,+Boston,+Massachusetts&amp;amp;z=17 JobSpring, Boylston St.]&lt;br /&gt;
&lt;br /&gt;
Topic - '''Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers'''&lt;br /&gt;
&lt;br /&gt;
Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.&lt;br /&gt;
 &lt;br /&gt;
Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.&lt;br /&gt;
 &lt;br /&gt;
Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.&lt;br /&gt;
 &lt;br /&gt;
The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.&lt;br /&gt;
 &lt;br /&gt;
Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come. &lt;br /&gt;
&lt;br /&gt;
 '''December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room'''&lt;br /&gt;
&lt;br /&gt;
'''Jeremiah Grossman – Founder and CTO WhiteHat Security'''&lt;br /&gt;
 &lt;br /&gt;
Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
 '''September 14 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz   -  OWASP O2 Platform'''&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). &lt;br /&gt;
&lt;br /&gt;
 '''September 7 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Adriel Desautels –  Differences between Penetration Testing and Vulnerability Scanning'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July  2011'''&lt;br /&gt;
&lt;br /&gt;
'''Anurag Agarwal, the founder of MyAppSecurity'''&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ==&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston &amp;lt;br /&amp;gt;&lt;br /&gt;
35 Wachusett Dr &amp;lt;br /&amp;gt;&lt;br /&gt;
Lexington, MA 02421 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/2017_BASC_Homepage Boston Application Security Conference 2017] &lt;br /&gt;
&lt;br /&gt;
[[2016 BASC Homepage|Boston Application Security Conference 2016]]&lt;br /&gt;
&lt;br /&gt;
[[2015 BASC Homepage|Boston Application Security Conference 2015]]&lt;br /&gt;
&lt;br /&gt;
[[2014 BASC Homepage|Boston Application Security Conference 2014]]&lt;br /&gt;
&lt;br /&gt;
[[2013 BASC Homepage|Boston Application Security Conference 2013]]&lt;br /&gt;
&lt;br /&gt;
[[2012 BASC Homepage|Boston Application Security Conference 2012]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boston OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
'''Contact'''&lt;br /&gt;
&lt;br /&gt;
* Email the [mailto:boston-leaders@owasp.org chapter leaders].&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
* [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Board of Directors''' &lt;br /&gt;
&lt;br /&gt;
* [mailto:lindaleigh.aberdale@owasp.org LindaLeigh Aberdale]&lt;br /&gt;
* [mailto:mark.arnold@owasp.org Mark Arnold] &lt;br /&gt;
* [mailto:tom.conner@owasp.org Tom Conner] &lt;br /&gt;
* [mailto:mike.perez@owasp.org Mike Perez]&lt;br /&gt;
* [mailto:roy.wattanasin@owasp.org Roy Wattanasin]&lt;br /&gt;
* [mailto:pedro.marcano@owasp.org Pedro Marcano]&lt;br /&gt;
* [mailto:Mark.Schlepphorst@owasp.org Mark Schlepphorst] &lt;br /&gt;
* [mailto:Ori.Zigindere@owasp.org Ori Zigindere] &lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] &lt;br /&gt;
[[Category:OWASP_Chapter]] &lt;br /&gt;
[[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=250747</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=250747"/>
				<updated>2019-04-29T01:16:58Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: chapter leader email&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=Follow @OWASPBOSTON on Twitter. The chapter leader is [mailto:boston@owasp.org Jim Weiler]. The Boston chapter is grateful for support from Constant Contact, Salesforce, Microsoft and Akamai for generously hosting space and their hospitality for various events.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
The Chapter would also like to thank our sponsors for their generous support.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsor ==&lt;br /&gt;
[[File:SIlogostacked.png|Security Innovation|https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:Veracode logo.png|Veracode|https://www.veracode.com/]]&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Boston-Banner-468x60.gif|link=2018_BASC_Homepage]] [[Image:twitter_32.png|link=https://twitter.com/@BASConf]] BASC 2019, the Boston Application Security Conference will take place 8:30am to 6:30pm on Saturday, October 19th at Microsoft, 5 Wayside Road, Burlington, MA.  [[2018 BASC Homepage|Read more]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings --- Our Fifteenth Year ==&lt;br /&gt;
&lt;br /&gt;
We now use [http://www.meetup.com/owaspboston/ meetup] to organize meetings.&lt;br /&gt;
&lt;br /&gt;
We meet whenever a speaker and a venue have available dates,  6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
Upcoming Meetings&lt;br /&gt;
&lt;br /&gt;
 ''January 29th, 2019'' - Cambridge [https://web.securityinnovation.com/owaspboston2019 Partnered with Security Innovation]&lt;br /&gt;
&lt;br /&gt;
Location: [https://goo.gl/maps/w11GUuJJAbo Quick Base office]&lt;br /&gt;
&lt;br /&gt;
5PM- '''Just bring your computer and evil inner-doer and you are ready to roll!'''&lt;br /&gt;
&lt;br /&gt;
Security Innovation is teaming up with OWASP Boston to offer attendees a fun &amp;quot;find the vulnerabilities&amp;quot; game - CMD+CTRL Cyber Range - that shows how hackers break into websites and teaches the importance of secure coding habits.  &lt;br /&gt;
&lt;br /&gt;
The CMD+CTRL Cyber Range we will be using is called ShadowBank, a banking website where players compete to find vulnerabilities, score points, and move up the leaderboard.  Leveraging cheat sheets, attack tables, and expert led training sessions, platers take their shot at stealing money, manipulating share prices, and conducting other nefarious acts.&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Training ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== Past Meetings ===&lt;br /&gt;
 ''June 14th, 2017'' - Burlington [https://www.meetup.com/owaspboston/events/240033562/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
7:00 pm  ''' Is RASP Ready?'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection is overhyped, according to many analysts and pundits. RASP promises applications that protect themselves - which sounds impossible - how can an application possibly protect itself? An agent that sits inside the app sounds like a deployment nightmare at worst, and a drain on the app at best. What’s the reality? Where are we now and what have we learned? &lt;br /&gt;
&lt;br /&gt;
We’ve seen deployment successes and failures, and we will draw from those specific experiences to describe: &lt;br /&gt;
Where does RASP work? &lt;br /&gt;
* What applications are well-suited for RASP? &lt;br /&gt;
* What types (organizational structure, culture, or skillset) of organizations are well-suited for RASP?&lt;br /&gt;
&lt;br /&gt;
What is the reality of RASP? &lt;br /&gt;
* Is RASP a deployment model or a feature set? &lt;br /&gt;
* How mature is RASP? Is it an over-hyped immature space, enterprise-ready, or somewhere in between? &lt;br /&gt;
* Which RASP capabilities do organizations use? And how do they validate those capabilities in their own environments? &lt;br /&gt;
* Can RASP replace the WAF?&lt;br /&gt;
&lt;br /&gt;
We will conclude, not with a sales pitch, but some lessons learned on: the three must have attributes for RASP, some suggestions on good candidates for RASP – both types of teams and types of applications, and finally - if, how, and when to get started. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Michael Feiertag, CEO and Co-Founder, tCell &lt;br /&gt;
Before co-founding tCell at the end of 2014, Michael led a string of successful products – most recently as head of products at Okta, and prior to that, as technology director at Blue Coat. Prior to Blue Coat, Michael held product management, engineering, and sales positions at several start-ups. Michael holds a B.S. from The University of Chicago, and an M.S. from the University of Maryland&lt;br /&gt;
&lt;br /&gt;
 '''May 2, 2017''' - Burlington [https://www.meetup.com/owaspboston/events/239130768/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
6:50 pm  '''Random Number Generation - Lava Lamps, Clouds, New Standards and the IoT - Richard Moulds'''&lt;br /&gt;
&lt;br /&gt;
The SANS Institute recently listed &amp;quot;Weak random number generators&amp;quot; as one of the 7 most dangerous security techniques to watch in 2017. But how do you really know how good your random numbers are? Virtualization and IoT make things worse and new standards are a wake-up call. Random numbers are the basis of security for all cryptography, yet they are often taken for granted. Without entropy, crypto is just math.  &lt;br /&gt;
&lt;br /&gt;
Learn why random numbers are so hard to generate and validate, compare different technologies in use today across virtualized environments, and discuss operational steps to take the risk out of random numbers and help secure cryptosystems even into the era of quantum computers. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Richard Moulds, General Manager of Whitewood Security, has spoken at RSA 2017 and at several OWASP chapter events in New York, Chicago and Austin. Richard has over 20 years of experience in the area of cryptography and encryption.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2, 2016''' - Cambridge [https://www.meetup.com/owaspboston/events/234648485/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 90 Broadway, Cambridge, MA 02142 (down the street from the usual location)&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
7:00 '&amp;lt;nowiki/&amp;gt;''Advanced Persistent Legal Threats''' - '''''&amp;lt;nowiki/&amp;gt;'''William Gamble, JD, LLM, EMBA'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Good cyber security can protect IT infrastructure against many attacks. Because of the difficulty in monetizing cyber thefts, the direct loss of a breach can be limited. However, the legal costs, both from government agencies and plaintiffs, can be far greater. The legal landscape, both in the US and internationally is changing as fast if not faster than the technology.&lt;br /&gt;
&lt;br /&gt;
Bio: I am a lawyer and a member of the Florida Bar.I used to practice tax, securities and banking law. I have written three books and spoken around the world on the economic efficiency of legal and regulatory infrastructures specifically in emerging markets like China. Over the past two years, I have immersed myself in cyber security. I now hold the CompTIA A+, Network+, and Security+. I will take the CASP next month. Besides keeping up with the regulations, I am studying incident response and auditing. I am also working toward my health care law certification. My hero is Dr. Johannes Ullrich.&lt;br /&gt;
&lt;br /&gt;
 '''September 28, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/233921522/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
6:15 '''OWASP Top 10 #1 - Injection Flaws'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss XML External Entity Injection flaws; how it works, how to prevent, code examples.&lt;br /&gt;
&lt;br /&gt;
6:45 '&amp;lt;nowiki/&amp;gt;''From the Frontlines of RASP Adoption''' - '''''&amp;lt;nowiki/&amp;gt;'''Goran Begic, VP of Product, IMMUNIO'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection (RASP) is one of the newest technologies coined by Gartner and it is in early stages of adoption in the industry. It promises dynamic defense and automatic mitigation of vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
This presentation is a summary of experiences from several dozens of commercial evaluations and early adoptions in production that took place this year and provides some examples of situations and challenges that are not specific to any individual vendor. In this talk Goran will provide an overview of buying criteria and evaluation requirements across different industries and some typical pitfalls that can slow down adoption.&lt;br /&gt;
&lt;br /&gt;
After the introduction and a brief reminder on the technology Goran will invite audience to participate in discussion about organizational requirements for adoption and operationalization of RASP. &lt;br /&gt;
&lt;br /&gt;
Questions for discussion: &lt;br /&gt;
&lt;br /&gt;
My application is under attack. &lt;br /&gt;
*What actions should I take? &lt;br /&gt;
*Who owns the response? &lt;br /&gt;
*Which attacks should I respond to and which ones can I ignore?&lt;br /&gt;
*How to get started with mitigation provided by technology? &lt;br /&gt;
*Does RASP fit with DevOps? &lt;br /&gt;
*Does RASP help with remediation? &lt;br /&gt;
&lt;br /&gt;
What this presentation is not: This is not a product pitch in any way. Evaluation criteria, comparison of RASP with IAST and other security technologies, personal experiences and examples discussed in this talk are generally applicable to all RASP solutions. &lt;br /&gt;
&lt;br /&gt;
Key takeaways:&lt;br /&gt;
&lt;br /&gt;
At the end of the presentation you will: &lt;br /&gt;
*get a better understanding of requirements for evaluation of RASP and its use cases, &lt;br /&gt;
*if you can pull a successful evaluation alone, or if you will need participation of other groups / teams &lt;br /&gt;
*learn about critical criteria for success of RASP in production &lt;br /&gt;
*how this criteria different relative to appsec testing tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 7, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Docker Containers and Application Security''' - '''Tsvi Korren'''&lt;br /&gt;
&lt;br /&gt;
Docker containers are transforming the way applications are developed and deployed. Closely tied to DevOps and Continuous Delivery, containers introduce both risks and opportunities to security management in Web applications. This talk will introduce the basic concepts of containers, how companies use them today and how to support this technology while elevating the security posture of your application stacks.&lt;br /&gt;
&lt;br /&gt;
Tsvi Korren, CISSP, has been an enterprise IT professional for 20 years with background in business process consulting in large organizations. Most recently at CA Technologies, he worked across verticals in government, retail, financial institutions and healthcare to implement compliance and security processes, from Identity and Access to Host and Server Controls. Tsvi is currently the director of technical services at Aqua, concentrating on building bridges between DevOps and Security.&lt;br /&gt;
&lt;br /&gt;
 '''June 8, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/230842887/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6-6:30 '''News, announcements, job postings, etc. '''&lt;br /&gt;
&lt;br /&gt;
6:30-7 '''Introduction to SQL Injection - Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Computer Science Curricula’s Failure - What Should We Do Now?''' - '''Ming Chow &amp;amp; Roy Wattanasin'''&lt;br /&gt;
&lt;br /&gt;
We are still facing the same security vulnerabilities from over a decade ago. The problems are not going away anytime soon and a reason is because Computer Science curricula are still churning out students who are not even exposed to security. This talk will address the lack of emphasis on information security in Computer Science curricula, how CS curricula have an obligation, how to gradually fix the problem by integrating security into many Computer Science undergraduate and graduate classes, and success stories from students. This talk will also discuss what Tufts and Brandeis are currently working on to further address the security education problem by creating a joint cyber security and policy program that spans multiple departments. Additional points and feedback from the audience are encouraged to help with the issue. All are encourage to attend to submit your feedback to help!&lt;br /&gt;
&lt;br /&gt;
Presenters: &lt;br /&gt;
&lt;br /&gt;
Ming Chow - @0xmchow &lt;br /&gt;
&lt;br /&gt;
Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He was a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World, DEF CON, Intel, SOURCE Conference, and BSides Boston. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2014 and 2015.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin - @wr0 &lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin is an adjunct faculty at Brandeis University in both the Health and Medical Informatics and Information Security graduate programs. He spends most of his time leading, teaching and developing information security programs, finding vulnerabilities, performing incident response and working on many projects. Roy has spoken at many conferences including RSA, ISSA International, Source Conference, Braintank, Cyber Security World, OWASP and the Security BSides conferences. He is also a healthcare information security professional. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2015. &lt;br /&gt;
&lt;br /&gt;
 '''May 4, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229788205/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Slightly different [http://www.akamai.com/html/about/locations.html Akamai] location: 90 Broadway, Cambridge, MA 02142 between Meadhall and the Mariott&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP''' - '''Dan Cornell'''&lt;br /&gt;
&lt;br /&gt;
There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.&lt;br /&gt;
&lt;br /&gt;
This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell is a globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application security program management platform. Cornell was Principal Investigator as Denim Group researched and developed the Hybrid Analysis Mapping (HAM) technology that lies at the heart of ThreadFix, through a Small Business Innovation Research (SBIR) contract with the Department of Homeland Security's Science and Technology Directorate.&lt;br /&gt;
&lt;br /&gt;
More information at: http://www.denimgroup.com/about_team_dan.html&lt;br /&gt;
&lt;br /&gt;
 '''April 6, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Runtime Application Self-Protection (RASP) Tools''' - '''Kunal Anand'''&lt;br /&gt;
&lt;br /&gt;
This talk will highlight the latest in AppSec and dive into a different kind of solution called Runtime Application Self-Protection (RASP). We'll also explore a new methodology called language theoretic security (LANGSEC) and explain how it can outperform existing approaches like pattern matching, regular expressions, etc. This talk will lay the foundation via informal and formal theory how lexers, tokenizers and parsers work. We’ll move onto constructing an open source toolchain to analyzing data and exploring interactive data visualizations. Along the way, we’ll cover performance tradeoffs and discuss the challenges of modern application security.&lt;br /&gt;
&lt;br /&gt;
Kunal Anand is the co-founder and CTO of Prevoty, a runtime application security platform. Prior to that, he was the Director of Technology at the BBC Worldwide, overseeing engineering and operations across the company’s global Digital Entertainment and Gaming initiatives. Kunal also has several years of experience leading security, data and engineering at Gravity, MySpace and NASA’s JetPropulsion Laboratory. His work has been featured in Wired Magazine and Fast Company. Kunal received a B.S. from Babson College.&lt;br /&gt;
&lt;br /&gt;
=== Past Training ===&lt;br /&gt;
&lt;br /&gt;
 '''March 16, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/229156529/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Demandware, Burlington.&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
6:30 '''Software Security by the Numbers''' - '''Chris Eng'''&lt;br /&gt;
&lt;br /&gt;
Deep dive into data we’ve collected about the state of software security in 2016 &lt;br /&gt;
* Based on scans of 200,000+ applications over an 18-month period &lt;br /&gt;
* How different industries and programming languages compare to one another &lt;br /&gt;
* Vulnerability remediation habits and patterns &lt;br /&gt;
* Three characteristics of a successful AppSec program &lt;br /&gt;
&lt;br /&gt;
Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies. Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.&lt;br /&gt;
&lt;br /&gt;
 '''January 26, 2016''' - Waltham - [http://www.meetup.com/owaspboston/events/228202040/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Waltham.  Trapelo Rd. exit from Rt. 128, toward Lincoln. The parking lot entrance is on the right, at the first traffic light. Drive around to the front of the office complex, facing the highway. Enter under the clock tower. Park in the front of the building and enter in the main building lobby, continue down the hallway and you will see the innovation center, enter in the large glass doors. &lt;br /&gt;
&lt;br /&gt;
7:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:20 '''What Security Testing Tools Miss'''&lt;br /&gt;
&lt;br /&gt;
Black Duck Software presents - Static analysis, dynamic analysis, and other testing tools are all essential weapons against adversaries.  But for the 80%+ of companies worldwide that use open source software in their application development these tools are ineffective in identifying and mitigating open source security risks . This presentation will cover:&lt;br /&gt;
&lt;br /&gt;
The value of static and dynamic tools, and where they best fit in the Secure Development Lifecycle          &lt;br /&gt;
&lt;br /&gt;
Why these tools are not useful in identifying known vulnerabilities in open source components          &lt;br /&gt;
&lt;br /&gt;
Controls development and security professionals can deploy to select, detect, manage and monitor open source for existing and newly disclosed vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Food will be provided by Constant Contact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2015''' - Cambridge - [http://www.meetup.com/owaspboston/events/226394218/ Meetup]&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway &lt;br /&gt;
Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
Attendee interaction is always mentioned as a high value at meetings and was great at the MetroWest meetings, so we're doing that at Akamai this month. Some discussion starters so far: SSL certificate impacts from CA/Browser alliance decisions and SHA1 weakness; mutual (client) SSL, javascript client and server side; what the heck is threat intelligence, dev ops and faster secure SDLC.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Metrowest&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 20, 7:00 pm&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Innovation Center, Reservoir Place, 1601 Trapelo Road, Waltham, MA 02451&lt;br /&gt;
&lt;br /&gt;
7:00 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:30 '''Access in Maliceland - Risk Based Access Control''' - '''Gunnar Peterson'''&lt;br /&gt;
&lt;br /&gt;
John Lambert observed attackers win because while defenders think in lists, attackers think in graphs. Access control systems divide the system a priori into secure and insecure states. But that’s only worth the paper its printed on. A  Attackers see the system as it is, for attackers, the access control scheme is the beginning of the game not the end. Determined attackers seek out access control models and then find holes that they can leverage. Access control systems that purport to protect the system are built on assumptions from which reality diverges. Application security needs a new approach to access control- adding feedback loops for risk based decisions,  fine-grained, dynamic access control. &lt;br /&gt;
&lt;br /&gt;
Security is a business with a very long list of issues and requirements. The spreadsheets are miles long. This makes it essential to find reusable solution patterns that can address multiple problems.This presentation looks at both medium term improvements and code examples to improve access control decisions and overall security today&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson ([https://twitter.com/oneraindrop @oneraindrop]) focuses on security architecture consulting and training. Experience includes Associate Editor for IEEE Security &amp;amp; Privacy Journal, a Microsoft MVP for App security, an IANS Research Faculty member, a Securosis Contributing Analyst, and a Visiting Scientist at Carnegie Mellon Software Engineering Institute. He maintains a popular information security blog at http://1raindrop.typepad.com.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Cambridge&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 8, 6:30 pm  ''NOTE: It's the second Wednesday this month.''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
 '''June 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Put Down the Megaphone: Effective Security Advocacy Without the Shouting''' - '''Darren Meyer'''&lt;br /&gt;
&lt;br /&gt;
10 years’ experience in the InfoSec community--including work with organizations in many verticals, in sizes ranging from startups to Fortune 50 enterprises, leading Application Security teams, building and delivering security instruction to developers, managers, and InfoSec professionals—has taught me the importance of crafting advocacy for different audiences. In this talk, I share my experiences in learning to be an effective advocate with three key audiences: developers, management, and non-technical staff.&lt;br /&gt;
&lt;br /&gt;
Darren is an Application Security advocate and researcher, technology hobbyist, and maker. He loves to learn, teach, nerd out, and inflict terrible puns on people. His background includes logistics, software development, and an assortment of information security roles including leading AppSec programs and professional security instruction targeting developers, managers, and InfoSec professionals.&lt;br /&gt;
&lt;br /&gt;
 '''May 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How the crowd is discovering critical vulns missed by traditional methods''' - '''Leif Dreizler'''&lt;br /&gt;
&lt;br /&gt;
State of the art security programs are turning to bug bounties to leverage a vast array of skill-sets and knowledge. Learn why these programs work, when to deploy them, and how you can bring these new application security testing capabilities into your own organization. The speaker will discuss real world examples from bug bounties and focus on cases where business logic flaws and high priority vulnerabilities were found ... even with existing security testing processes in place. &lt;br /&gt;
&lt;br /&gt;
Attendees will learn:&lt;br /&gt;
&lt;br /&gt;
Testing methods deployed by our crowd that help them find bugs the scanners miss&lt;br /&gt;
&lt;br /&gt;
Examples of the high quality of bugs our crowd is finding, including P1'sTrends which vulnerability types are found most often and whyWhat is the ROI on the pay for performance modelWhere does the SDLC merge into crowdsourced testing&lt;br /&gt;
&lt;br /&gt;
Leif Dreizler is a Senior Security Engineer at Bugcrowd, the innovator in crowdsourced security testing for the enterprise. Prior to joining Bugcrowd, Leif was a Senior Application Security Engineer at Redspin, performing application security assessments. During his time at Redspin he also served as the Application Team Lead, liaising with clients at the engineering and sales level. He has also made minor contributions to the Firebug project. Leif attended the University of California, Santa Barbara where he studied Computer Science. Leif recently spoke to the NYC Security Meet-up group.&lt;br /&gt;
&lt;br /&gt;
 '''April 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler Will show some actual examples and patterns of SQL Injection attempts&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Are You An Imposter? Me too!''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
Many people in the information security field feel like a fraud, or an imposter. In reality, we often know far more, and are capable of far more than we believe we do. There is so much to know and we constantly hear about the latest groundbreaking research done by others, which makes us feel less important or worthy. Let’s talk about what Imposter Syndrome is, its prevalence, and then we can start to realize just how capable we are and go forward with the confidence in the field.&lt;br /&gt;
&lt;br /&gt;
 '''March 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, March 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Prioritizing Web Application Vulnerabilities – A Hacker’s Perspective''' - '''Nick Silver'''&lt;br /&gt;
&lt;br /&gt;
The best application risk models capture not only the technical risk factors, but also the business context in which an asset lives.  Traditionally, this is done by auditing application owners on an array of questions in order to properly classify the asset and its data – but that takes time which could be better spent elsewhere.  We interviewed dozens of hackers and asked them which vulnerabilities they would look for first depending on the type of attack they wanted to carry out.  We’ll walk through several examples of how to use this data as a shortcut means for prioritizing risk without the need for any pesky audit questionnaires.&lt;br /&gt;
&lt;br /&gt;
Nick Silver is a Senior Solutions Architect with WhiteHat Security.  He is responsible for translating business requirements into technical ones and assisting businesses in implementing web security programs.  Previously, Nick led a team in WhiteHat’s Threat Research Center where they were responsible for testing more than 2,000 of their customers’ websites for vulnerabilities.  &lt;br /&gt;
&lt;br /&gt;
 '''February 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, announcements''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Incident Response and Web Application Security - Stories from the Trenches''' - '''Fred House and Joe Ceirante'''&lt;br /&gt;
&lt;br /&gt;
Mandiant has conducted numerous incident response engagements throughout its history, including a record number of 200 incidents in 2014. Mandiant consultants Fred House and Joe Ceirante will discuss case studies and trends Mandiant has observed in relation to web application security.&lt;br /&gt;
 &lt;br /&gt;
Topics will include the types of threat actors that target web applications, the techniques they use to compromise web applications, and the activities they perform once inside the network. Techniques for detecting and mitigating web compromises will also be reviewed. All content will be derived from the real-world compromises that Mandiant has investigated.&lt;br /&gt;
&lt;br /&gt;
 '''January 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 7, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, risk analysis of Poodle''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How a Hacker Views Your Web Site''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
''The most popular presentation of BASC 2014''&lt;br /&gt;
&lt;br /&gt;
As defenders, we have to be right 100% of the time where an attacker only needs to be right once. The attack surface of a modern web site is incredibly large and we need to be aware of all of it. Additionally, individual attacks may not always be effective but sometimes using them together can gain the desired effect. In this talk, we’ll take a look at the whole attack surface for a typical web site and the various ways that an attacker will use to compromise a site.&lt;br /&gt;
&lt;br /&gt;
 '''December 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, December 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News and Views You Can Use and Abuse''' - '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
* Some thoughts and analysis on some current app security news and other stuff&lt;br /&gt;
* Adobe password breach&lt;br /&gt;
* Reducing Web Application Firewall SQL injection false positives&lt;br /&gt;
 &lt;br /&gt;
7:15 '''Swift and Security''' - '''Ming Chow'''&lt;br /&gt;
 &lt;br /&gt;
Apple is pushing its new programming language Swift for iOS development and for many good reasons.  This talk will discuss what the language has right in terms of security, the old and new security pitfalls, and what developers need to be aware of moving forward with using the new language.  The fact to the matter is, iOS isn't going away, iOS developers will need to learn and use Swift, and there will be a big rush of Swift-based apps: we might as well learn how to do it right the first time around.&lt;br /&gt;
 &lt;br /&gt;
Ming Chow is an Instructor at the Department of Computer Science, Tufts University. Ten years of web development experience.&lt;br /&gt;
Specialties: Web and Mobile Development, Web and Mobile Security&lt;br /&gt;
&lt;br /&gt;
 '''July 2014'''&lt;br /&gt;
&lt;br /&gt;
Topics: '''Grails Security''' and '''Validating Cross-Site Scripting Vulns with xssValidator'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Cyrus Malekpour''' and '''John Poulin'''&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic 1: ''Grails Security''&lt;br /&gt;
&lt;br /&gt;
Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.&lt;br /&gt;
 &lt;br /&gt;
Cyrus Malekpour (@cmalekpour) is currently interning at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development. &lt;br /&gt;
 &lt;br /&gt;
Topic 2: ''Validating Cross-Site Scripting Vulns with xssValidator''&lt;br /&gt;
 &lt;br /&gt;
xssValidator is a tool developed to automate the testing and validation of Cross-Site Scripting (xss) vulnerabilities within web applications. Automated scanners tend to report large amounts of false-positives, and as consultants we're forced spending our time trying to verify these findings. xssValidator leverages scriptable web-browsers such as PhantomJS and Slimer.js to automatically validate these findings.&lt;br /&gt;
 &lt;br /&gt;
John Poulin is an application security consultant for nVisium who specializes in web application security. He worked previously as a web developer and software engineer that focused on building multi-tier web applications. When he's not hacking on web apps, John spends his time building tools to help him hack on web apps! You can find him on twitter: @forced_request and on myspace: REDACTED.&lt;br /&gt;
&lt;br /&gt;
 '''June 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection and the OWASP Zed Attack Proxy (ZAP)'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Rob Cheyne and Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 - general networking, news discussion, announcements.&lt;br /&gt;
&lt;br /&gt;
7:00 - main presentations&lt;br /&gt;
&lt;br /&gt;
The June 4th meeting will be the second in our series of 2014 training meetings. Rob Cheyne will continue explaining and exploring SQL Injection by conducting an actual injection attack.&lt;br /&gt;
&lt;br /&gt;
This will be a demo-based discussion to get into the mindset of an attacker, and show how an attacker goes after a site. Demo will include: &lt;br /&gt;
&lt;br /&gt;
* BurpProxy demo &lt;br /&gt;
* Common authentication flaws &lt;br /&gt;
* SQL Injection Demo that shows the process and how it builds to a full compromise&lt;br /&gt;
&lt;br /&gt;
'''Rob Cheyne''' is currently CEO of Big Brain Security. In addition to security consulting for Fortune 500 customers, he was the author of LC4, a version of the award-winning L0phtCrack password auditing tool, and he also worked on the code scanning technology that was eventually spun off as Veracode. Rob was at @stake from the very first customer all the way through to the $50M acquisition by Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Jim Weiler''' will introduce the OWASP Zed Attack Proxy (ZAP). This is a very powerful free OWASP intercepting proxy that lets you see, analyze, change, replay etc. every browser request and response, analyze your session, scan and attack web sites, save the results and run reports. We can't cover all the functionality but we'll show some practical tips and techniques.&lt;br /&gt;
&lt;br /&gt;
Pizza, salad and soda courtesy of Akamai&lt;br /&gt;
&lt;br /&gt;
 '''March 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection, WebGoat, Cross Site Request Forgery'''&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
When: Wednesday, March 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
There will be three training sessions:&lt;br /&gt;
&lt;br /&gt;
One will be on SQL Injection - intro, detection, prevention, scanning and false positives. This is the most serious web application vulnerability.&lt;br /&gt;
&lt;br /&gt;
The second will be on OWASP WebGoat. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE or in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. There are hints and 39 different lesson plans on various vulnerabilities and technologies. We won't cover all of them of course!&lt;br /&gt;
&lt;br /&gt;
The third will be on Cross Site Request Forgery - not a hack really, it's just the way the web works. But it causes apps to do legitimate things that you didn't ask them to do.&lt;br /&gt;
&lt;br /&gt;
Pizza and drinks provided by Akamai.&lt;br /&gt;
&lt;br /&gt;
 '''January 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''JavaScript Verification: From Browsers to Pages'''&lt;br /&gt;
&lt;br /&gt;
Modern web browsers implement a &amp;quot;private browsing&amp;quot; mode that is intended to leave behind no traces of a user's browsing activity on their computer. This feature is in direct tension with support for *extensions*, which let users add third-party functionality into their browser. I will discuss the scope of this problem, present our approach to verifying extensions' compliance with private browsing mode, and sketch our findings on several real, third-party extensions. I will then briefly describe the toolkit underlying our approach, and end with a sketch of a newer project, adapting this approach to the very different-seeming problem of statically catching errors when using the jQuery library.&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
&lt;br /&gt;
Benjamin Lerner has just completed a post-doctoral research position in the PLT group at Brown University, and is now a lecturer at Northeastern University.  His research examines the challenges of analyzing client-side web programming, from the behavior of web pages down through the semantics of the browser.  He received a PhD in Computer Science from the University of Washington in 2011, building a platform to analyze conflicts between browser extensions, and a B.S. in Computer Science and Mathematics from Yale University.&lt;br /&gt;
&lt;br /&gt;
 '''November 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Attacking iOS Applications'''  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://www.slideshare.net/kfosaaen/i-os-gcandpb On slideshare]&lt;br /&gt;
&lt;br /&gt;
This presentation will cover the basics of attacking iOS applications (and their back ends) using a web proxy to intercept, modify, and repeat HTTP/HTTPS requests. (The proxy used during research was Burp; however, any HTTP intercepting proxy such as OWASP ZAP could be used) From setting up the proxy to pulling data from the backend systems, this talk will be a great primer for anyone interested in testing iOS applications at the HTTP protocol level. There will be a short (2 minute) primer on setting up the intercepting proxy, followed by three practical examples showing how to intercept data headed to the phone, how to modify data heading to the application server, and how to pull extra data from application servers to further an attack. All of these examples will focus on native iOS apps (Game Center and Passbook) and/or functionality (Passbook Passes).&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Karl Fosaaen'''&lt;br /&gt;
&lt;br /&gt;
Karl is a senior security consultant at NetSPI. This role has allowed Karl to work in a variety of industries, including financial services, health care, and hardware manufacturing. Karl specializes in network and web application penetration testing. In his spare time, Karl helps out as an OPER at THOTCON and a swag goon at DEF CON.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, October 2, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Abusing NoSQL Databases'''&lt;br /&gt;
&lt;br /&gt;
The days of selecting from a few SQL database options for an application are over. There is now a plethora of NoSQL database options to choose from: some are better than others for certain jobs. There are good reasons why developers are choosing them over traditional SQL databases including performance, scalabiltiy, and ease-of-use. Unfortunately like for many hot techologies, security is largely an afterthought in NoSQL databases. This short but concise presentation will illustrate how poor the quality of security in many NoSQL database systems is. This presentation will not be confined to one particular NoSQL database system. Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, encryption; and those that affect specific NoSQL database systems such as MongoDB and CouchDB. The ideas that we now have a complicated heterogeneous problem and that defense-in-depth is even more necessary will be stressed. There is a common misconception that SQL injection attacks are eliminated by using a NoSQL database system. While specifically SQL injection is largely eliminated, injection attack vectors have increased thanks to JavaScript and the flexibility of NoSQL databases. This presentation will present and demo new classes of injection attacks. Attendees should be familiar with JavaScript and JSON. &lt;br /&gt;
&lt;br /&gt;
Presenter: '''Ming Chow'''&lt;br /&gt;
&lt;br /&gt;
Ming Chow (@tufts_cs_mchow) is a Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He teaches courses largely in the undergraduate curriculum including the second course in the major sequence, Web Programming, Music Apps on the iPad, and Introduction to Computer Security. He was also a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World (2011 and 2012), DEF CON 19 (2011), the Design Automation Conference (2011), Intel, and the SOURCE Conference (Boston 2013). Ming's projects in information security include building numerous CTF challenges, Internet investigations, HTML5 and JavaScript security, and Android forensics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2013 - Joint Meeting with [http://www.meetup.com/Boston-cloud-services/ Boston Cloud Services]''' &lt;br /&gt;
&lt;br /&gt;
When: Tuesday, September 10, 6 pm&lt;br /&gt;
&lt;br /&gt;
Location: Microsoft NERD Center ''(not our usual location)''&lt;br /&gt;
&lt;br /&gt;
'''Note: This is a joint meeting. Please register at [http://www.meetup.com/Boston-cloud-services/ the Boston Cloud Services meetup page] if you plan to attend.'''&lt;br /&gt;
&lt;br /&gt;
There will be two presentations at this meeting:&lt;br /&gt;
&lt;br /&gt;
Topic: '''People Centric Security (PCS)'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Nick Stamos'''&lt;br /&gt;
&lt;br /&gt;
People Centric Security (PCS) is a new security model, presented as part of Gartner's Maverick Research 2 year ago. PCS is well suited for Cloud Business/Consumer services such as Dropbox, Google Drive, SkyDrive, etc. PCS enables users to have what they desire, and provides enterprises what they require for data governance and compliance. Nick Stamos co-founded his fourth company, nCrypted Cloud in July of 2012. His past startups include Verdasys, Phase Forward (IPO FY2004, $685M Oracle Acquisition 2010), and Amulet. He studied at Tufts University where he received a BSEE and MSEE.&lt;br /&gt;
&lt;br /&gt;
Topic: '''SSL Certs'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
Practical experiences with issuing and risk assessing SSL certs for enterprise applications on a cloud provider: who creates the CSR, how do you protect the private key on the cloud server, certs on cloud provider managed load balancers vrs 3rd party managed app servers, roles and responsibilities of cloud IT, 3rd party developer IT, enterprise IT and service providers. Jim Weiler is Application Security Architect at Starwoods Hotels and the Chapter Leader of OWASP Boston.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2013 - Doubleheader!'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 10, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Topic: '''RailsGoat'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
Abstract: While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. [http://railsgoat.cktricky.com/ RailsGoat] is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.&lt;br /&gt;
&lt;br /&gt;
Topic: '''PhoneGap on Android'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PhoneGap is a widely used framework that allows developers to rapidly build cross-platform mobile applications using HTML5, JavaScript, and CSS. Using PhoneGap plugins, developers can call native platform APIs from browser-like applications using JavaScript. This approach introduces vulnerabilities that are not typically as prevalent within native Android applications, warranting a fresh look at the way we view mobile applications. In this presentation, we will take a deep look at the Android implementation of the framework and we will examine the overall attack surface for applications. Real-world examples of vulnerable applications will be demonstrated as well in order to provide context, entertainment, and enjoyment.&lt;br /&gt;
&lt;br /&gt;
About the Speakers:&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''We see the future…and it isn’t pretty'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Andrea Mulligan, Sr. Director at Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future. &lt;br /&gt;
&lt;br /&gt;
 '''May 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Systems Thinking + Web Security'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Akamai'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Akamai will present on ‘Systems Thinking + Web Security’. There will also be an audience review exercise facilitated by the Akamai presenters.  This is a great chance to hear some interesting perspectives on web security from Akamai, who handles about one third of all internet traffic.&lt;br /&gt;
&lt;br /&gt;
 '''April 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Sonotype'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
* Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important. &lt;br /&gt;
* Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.&lt;br /&gt;
* OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are. &lt;br /&gt;
* OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.&lt;br /&gt;
* OSS Component Policy Examples&lt;br /&gt;
* Example Application Compositions Reports&lt;br /&gt;
* Example Use cases IDE, CI, repository, production applications&lt;br /&gt;
* Discussion&lt;br /&gt;
&lt;br /&gt;
About Sonatype:&lt;br /&gt;
&lt;br /&gt;
Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository. &lt;br /&gt;
&lt;br /&gt;
 '''March 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''What is BSIMM?'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Nabil Hannan'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.&lt;br /&gt;
 &lt;br /&gt;
The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.  &lt;br /&gt;
&lt;br /&gt;
BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers. &lt;br /&gt;
&lt;br /&gt;
The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''BroBot'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Eric Kobrin, Akamai'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.&lt;br /&gt;
 &lt;br /&gt;
His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:&lt;br /&gt;
&lt;br /&gt;
* Vulnerable system discovery&lt;br /&gt;
* Zombie compromise&lt;br /&gt;
* Control structure&lt;br /&gt;
* Attack traffic&lt;br /&gt;
* Mitigation steps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Third-Party Application Analysis: Best Practices and Lessons Learned'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Chad Holmes, Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.&lt;br /&gt;
&lt;br /&gt;
The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some.  The order of the presentation is:&lt;br /&gt;
&lt;br /&gt;
·         Adoption rates of externally developed software&lt;br /&gt;
&lt;br /&gt;
·         The risk within those apps&lt;br /&gt;
&lt;br /&gt;
·         Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)&lt;br /&gt;
&lt;br /&gt;
·         Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)&lt;br /&gt;
&lt;br /&gt;
·         Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)&lt;br /&gt;
&lt;br /&gt;
·         Best Practices for high rates of adoption&lt;br /&gt;
&lt;br /&gt;
·         Lessons Learned and Recommendations&lt;br /&gt;
&lt;br /&gt;
Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.&lt;br /&gt;
&lt;br /&gt;
 '''June 2012'''&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker '''Will Vandevanter - Rapid 7'''&lt;br /&gt;
&lt;br /&gt;
'''Fingerprinting web applications of all kinds'''&lt;br /&gt;
&lt;br /&gt;
This turbo talk will introduce a new Metasploit module that fingerprints &amp;quot;known&amp;quot; web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others. &lt;br /&gt;
&lt;br /&gt;
Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 '''May 31 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Jobspring, Boston. 545 Boylston st. &lt;br /&gt;
&lt;br /&gt;
Speaker - '''Glenn Gramling, Vice President, Cenzic'''&lt;br /&gt;
&lt;br /&gt;
“Cloudy with a Chance of Hack”&lt;br /&gt;
&lt;br /&gt;
Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of &amp;quot;stormy weather.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Glenn Gramling is responsible for global sales and business development for Cenzic’s  application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 11, 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker - '''David Eoff, Senior Product Marketing Manager, HP Enterprise Security'''&lt;br /&gt;
&lt;br /&gt;
David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.&lt;br /&gt;
&lt;br /&gt;
Topic - '''Gray, the New Black:  Gray-Box Vulnerability Testing'''&lt;br /&gt;
&lt;br /&gt;
Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software:  Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST).  While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions:  information about the inner workings and behavior of applications undergoing DAST and SAST analysis.&lt;br /&gt;
 &lt;br /&gt;
This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers.  It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.&lt;br /&gt;
&lt;br /&gt;
 '''March 8, 2012, with the Boston Security Meetup group'''&lt;br /&gt;
&lt;br /&gt;
Location - [http://maps.google.com/maps?q=Jobspring+Partners,+Boylston+Street,+Boston,+MA&amp;amp;hl=en&amp;amp;sll=42.362243,-71.081628&amp;amp;sspn=0.019549,0.037594&amp;amp;oq=jobspring&amp;amp;t=v&amp;amp;hq=Jobspring+Partners,&amp;amp;hnear=Boylston+St,+Boston,+Massachusetts&amp;amp;z=17 JobSpring, Boylston St.]&lt;br /&gt;
&lt;br /&gt;
Topic - '''Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers'''&lt;br /&gt;
&lt;br /&gt;
Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.&lt;br /&gt;
 &lt;br /&gt;
Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.&lt;br /&gt;
 &lt;br /&gt;
Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.&lt;br /&gt;
 &lt;br /&gt;
The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.&lt;br /&gt;
 &lt;br /&gt;
Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come. &lt;br /&gt;
&lt;br /&gt;
 '''December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room'''&lt;br /&gt;
&lt;br /&gt;
'''Jeremiah Grossman – Founder and CTO WhiteHat Security'''&lt;br /&gt;
 &lt;br /&gt;
Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
 '''September 14 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz   -  OWASP O2 Platform'''&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). &lt;br /&gt;
&lt;br /&gt;
 '''September 7 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Adriel Desautels –  Differences between Penetration Testing and Vulnerability Scanning'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July  2011'''&lt;br /&gt;
&lt;br /&gt;
'''Anurag Agarwal, the founder of MyAppSecurity'''&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ==&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston &amp;lt;br /&amp;gt;&lt;br /&gt;
35 Wachusett Dr &amp;lt;br /&amp;gt;&lt;br /&gt;
Lexington, MA 02421 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/2017_BASC_Homepage Boston Application Security Conference 2017] &lt;br /&gt;
&lt;br /&gt;
[[2016 BASC Homepage|Boston Application Security Conference 2016]]&lt;br /&gt;
&lt;br /&gt;
[[2015 BASC Homepage|Boston Application Security Conference 2015]]&lt;br /&gt;
&lt;br /&gt;
[[2014 BASC Homepage|Boston Application Security Conference 2014]]&lt;br /&gt;
&lt;br /&gt;
[[2013 BASC Homepage|Boston Application Security Conference 2013]]&lt;br /&gt;
&lt;br /&gt;
[[2012 BASC Homepage|Boston Application Security Conference 2012]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boston OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
'''Contact'''&lt;br /&gt;
&lt;br /&gt;
Email the [mailto:boston-leaders@owasp.org chapter leaders].&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Board of Directors''' &lt;br /&gt;
&lt;br /&gt;
* [mailto:lindaleigh.aberdale@owasp.org LindaLeigh Aberdale]&lt;br /&gt;
* [mailto:mark.arnold@owasp.org Mark Arnold] &lt;br /&gt;
* [mailto:tom.conner@owasp.org Tom Conner] &lt;br /&gt;
* [mailto:mike.perez@owasp.org Mike Perez]&lt;br /&gt;
* [mailto:roy.wattanasin@owasp.org Roy Wattanasin]&lt;br /&gt;
* [mailto:pedro.marcano@owasp.org Pedro Marcano]&lt;br /&gt;
* [mailto:Mark.Schlepphorst@owasp.org Mark Schlepphorst] &lt;br /&gt;
* [mailto:Ori.Zigindere@owasp.org Ori Zigindere] &lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] &lt;br /&gt;
[[Category:OWASP_Chapter]] &lt;br /&gt;
[[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=250742</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=250742"/>
				<updated>2019-04-29T01:08:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=Follow @OWASPBOSTON on Twitter. The chapter leader is [mailto:boston@owasp.org Jim Weiler]. The Boston chapter is grateful for support from Constant Contact, Salesforce, Microsoft and Akamai for generously hosting space and their hospitality for various events.&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
The Chapter would also like to thank our sponsors for their generous support.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
== Chapter Sponsor ==&lt;br /&gt;
[[File:SIlogostacked.png|Security Innovation|https://www.securityinnovation.com/]]&lt;br /&gt;
&lt;br /&gt;
[[File:Veracode logo.png|Veracode|https://www.veracode.com/]]&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Boston-Banner-468x60.gif|link=2018_BASC_Homepage]] [[Image:twitter_32.png|link=https://twitter.com/@BASConf]] BASC 2019, the Boston Application Security Conference will take place 8:30am to 6:30pm on Saturday, October 19th at Microsoft, 5 Wayside Road, Burlington, MA.  [[2018 BASC Homepage|Read more]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings --- Our Fifteenth Year ==&lt;br /&gt;
&lt;br /&gt;
We now use [http://www.meetup.com/owaspboston/ meetup] to organize meetings.&lt;br /&gt;
&lt;br /&gt;
We meet whenever a speaker and a venue have available dates,  6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
Upcoming Meetings&lt;br /&gt;
&lt;br /&gt;
 ''January 29th, 2019'' - Cambridge [https://web.securityinnovation.com/owaspboston2019 Partnered with Security Innovation]&lt;br /&gt;
&lt;br /&gt;
Location: [https://goo.gl/maps/w11GUuJJAbo Quick Base office]&lt;br /&gt;
&lt;br /&gt;
5PM- '''Just bring your computer and evil inner-doer and you are ready to roll!'''&lt;br /&gt;
&lt;br /&gt;
Security Innovation is teaming up with OWASP Boston to offer attendees a fun &amp;quot;find the vulnerabilities&amp;quot; game - CMD+CTRL Cyber Range - that shows how hackers break into websites and teaches the importance of secure coding habits.  &lt;br /&gt;
&lt;br /&gt;
The CMD+CTRL Cyber Range we will be using is called ShadowBank, a banking website where players compete to find vulnerabilities, score points, and move up the leaderboard.  Leveraging cheat sheets, attack tables, and expert led training sessions, platers take their shot at stealing money, manipulating share prices, and conducting other nefarious acts.&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Training ===&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
=== Past Meetings ===&lt;br /&gt;
 ''June 14th, 2017'' - Burlington [https://www.meetup.com/owaspboston/events/240033562/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
7:00 pm  ''' Is RASP Ready?'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection is overhyped, according to many analysts and pundits. RASP promises applications that protect themselves - which sounds impossible - how can an application possibly protect itself? An agent that sits inside the app sounds like a deployment nightmare at worst, and a drain on the app at best. What’s the reality? Where are we now and what have we learned? &lt;br /&gt;
&lt;br /&gt;
We’ve seen deployment successes and failures, and we will draw from those specific experiences to describe: &lt;br /&gt;
Where does RASP work? &lt;br /&gt;
* What applications are well-suited for RASP? &lt;br /&gt;
* What types (organizational structure, culture, or skillset) of organizations are well-suited for RASP?&lt;br /&gt;
&lt;br /&gt;
What is the reality of RASP? &lt;br /&gt;
* Is RASP a deployment model or a feature set? &lt;br /&gt;
* How mature is RASP? Is it an over-hyped immature space, enterprise-ready, or somewhere in between? &lt;br /&gt;
* Which RASP capabilities do organizations use? And how do they validate those capabilities in their own environments? &lt;br /&gt;
* Can RASP replace the WAF?&lt;br /&gt;
&lt;br /&gt;
We will conclude, not with a sales pitch, but some lessons learned on: the three must have attributes for RASP, some suggestions on good candidates for RASP – both types of teams and types of applications, and finally - if, how, and when to get started. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Michael Feiertag, CEO and Co-Founder, tCell &lt;br /&gt;
Before co-founding tCell at the end of 2014, Michael led a string of successful products – most recently as head of products at Okta, and prior to that, as technology director at Blue Coat. Prior to Blue Coat, Michael held product management, engineering, and sales positions at several start-ups. Michael holds a B.S. from The University of Chicago, and an M.S. from the University of Maryland&lt;br /&gt;
&lt;br /&gt;
 '''May 2, 2017''' - Burlington [https://www.meetup.com/owaspboston/events/239130768/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=5+Wall+St.%2C+Burlington%2C+MA%2C+us SalesForce (was Demandware) 5 Wall St., Burlington, MA]&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
5:30 - 6:15 - '''Chat, Chew and Brew'''&lt;br /&gt;
&lt;br /&gt;
6:15 - 6:45 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
Chapter and OWASP events and news, audience announcements, questions, application security news(Google and Symantec certs, HTML5, Chrome features, SDLC and Microservices, others?)&lt;br /&gt;
&lt;br /&gt;
6:50 pm  '''Random Number Generation - Lava Lamps, Clouds, New Standards and the IoT - Richard Moulds'''&lt;br /&gt;
&lt;br /&gt;
The SANS Institute recently listed &amp;quot;Weak random number generators&amp;quot; as one of the 7 most dangerous security techniques to watch in 2017. But how do you really know how good your random numbers are? Virtualization and IoT make things worse and new standards are a wake-up call. Random numbers are the basis of security for all cryptography, yet they are often taken for granted. Without entropy, crypto is just math.  &lt;br /&gt;
&lt;br /&gt;
Learn why random numbers are so hard to generate and validate, compare different technologies in use today across virtualized environments, and discuss operational steps to take the risk out of random numbers and help secure cryptosystems even into the era of quantum computers. &lt;br /&gt;
&lt;br /&gt;
''Speaker'': Richard Moulds, General Manager of Whitewood Security, has spoken at RSA 2017 and at several OWASP chapter events in New York, Chicago and Austin. Richard has over 20 years of experience in the area of cryptography and encryption.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2, 2016''' - Cambridge [https://www.meetup.com/owaspboston/events/234648485/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 90 Broadway, Cambridge, MA 02142 (down the street from the usual location)&lt;br /&gt;
&lt;br /&gt;
Everyone should report to Akamai 90 Broadway in the lobby and indicate about the Meetup. Someone form the staff will escort them to the 12th floor.&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
7:00 '&amp;lt;nowiki/&amp;gt;''Advanced Persistent Legal Threats''' - '''''&amp;lt;nowiki/&amp;gt;'''William Gamble, JD, LLM, EMBA'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Good cyber security can protect IT infrastructure against many attacks. Because of the difficulty in monetizing cyber thefts, the direct loss of a breach can be limited. However, the legal costs, both from government agencies and plaintiffs, can be far greater. The legal landscape, both in the US and internationally is changing as fast if not faster than the technology.&lt;br /&gt;
&lt;br /&gt;
Bio: I am a lawyer and a member of the Florida Bar.I used to practice tax, securities and banking law. I have written three books and spoken around the world on the economic efficiency of legal and regulatory infrastructures specifically in emerging markets like China. Over the past two years, I have immersed myself in cyber security. I now hold the CompTIA A+, Network+, and Security+. I will take the CASP next month. Besides keeping up with the regulations, I am studying incident response and auditing. I am also working toward my health care law certification. My hero is Dr. Johannes Ullrich.&lt;br /&gt;
&lt;br /&gt;
 '''September 28, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/233921522/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, Announcements'''&lt;br /&gt;
&lt;br /&gt;
6:15 '''OWASP Top 10 #1 - Injection Flaws'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss XML External Entity Injection flaws; how it works, how to prevent, code examples.&lt;br /&gt;
&lt;br /&gt;
6:45 '&amp;lt;nowiki/&amp;gt;''From the Frontlines of RASP Adoption''' - '''''&amp;lt;nowiki/&amp;gt;'''Goran Begic, VP of Product, IMMUNIO'''&lt;br /&gt;
&lt;br /&gt;
Runtime Application Self-Protection (RASP) is one of the newest technologies coined by Gartner and it is in early stages of adoption in the industry. It promises dynamic defense and automatic mitigation of vulnerabilities in web applications.&lt;br /&gt;
&lt;br /&gt;
This presentation is a summary of experiences from several dozens of commercial evaluations and early adoptions in production that took place this year and provides some examples of situations and challenges that are not specific to any individual vendor. In this talk Goran will provide an overview of buying criteria and evaluation requirements across different industries and some typical pitfalls that can slow down adoption.&lt;br /&gt;
&lt;br /&gt;
After the introduction and a brief reminder on the technology Goran will invite audience to participate in discussion about organizational requirements for adoption and operationalization of RASP. &lt;br /&gt;
&lt;br /&gt;
Questions for discussion: &lt;br /&gt;
&lt;br /&gt;
My application is under attack. &lt;br /&gt;
*What actions should I take? &lt;br /&gt;
*Who owns the response? &lt;br /&gt;
*Which attacks should I respond to and which ones can I ignore?&lt;br /&gt;
*How to get started with mitigation provided by technology? &lt;br /&gt;
*Does RASP fit with DevOps? &lt;br /&gt;
*Does RASP help with remediation? &lt;br /&gt;
&lt;br /&gt;
What this presentation is not: This is not a product pitch in any way. Evaluation criteria, comparison of RASP with IAST and other security technologies, personal experiences and examples discussed in this talk are generally applicable to all RASP solutions. &lt;br /&gt;
&lt;br /&gt;
Key takeaways:&lt;br /&gt;
&lt;br /&gt;
At the end of the presentation you will: &lt;br /&gt;
*get a better understanding of requirements for evaluation of RASP and its use cases, &lt;br /&gt;
*if you can pull a successful evaluation alone, or if you will need participation of other groups / teams &lt;br /&gt;
*learn about critical criteria for success of RASP in production &lt;br /&gt;
*how this criteria different relative to appsec testing tools.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 7, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Docker Containers and Application Security''' - '''Tsvi Korren'''&lt;br /&gt;
&lt;br /&gt;
Docker containers are transforming the way applications are developed and deployed. Closely tied to DevOps and Continuous Delivery, containers introduce both risks and opportunities to security management in Web applications. This talk will introduce the basic concepts of containers, how companies use them today and how to support this technology while elevating the security posture of your application stacks.&lt;br /&gt;
&lt;br /&gt;
Tsvi Korren, CISSP, has been an enterprise IT professional for 20 years with background in business process consulting in large organizations. Most recently at CA Technologies, he worked across verticals in government, retail, financial institutions and healthcare to implement compliance and security processes, from Identity and Access to Host and Server Controls. Tsvi is currently the director of technical services at Aqua, concentrating on building bridges between DevOps and Security.&lt;br /&gt;
&lt;br /&gt;
 '''June 8, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/230842887/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [https://www.google.com/maps/place/5+Wall+St,+Burlington,+MA+01803/@42.4877956,-71.1904085,17z/data=!3m1!4b1!4m5!3m4!1s0x89e3758106c4cb55:0xc155e97a6d34883e!8m2!3d42.4877956!4d-71.1882198?hl=en Demandware] at 5 Wall St., Burlington, MA&lt;br /&gt;
&lt;br /&gt;
6-6:30 '''News, announcements, job postings, etc. '''&lt;br /&gt;
&lt;br /&gt;
6:30-7 '''Introduction to SQL Injection - Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Computer Science Curricula’s Failure - What Should We Do Now?''' - '''Ming Chow &amp;amp; Roy Wattanasin'''&lt;br /&gt;
&lt;br /&gt;
We are still facing the same security vulnerabilities from over a decade ago. The problems are not going away anytime soon and a reason is because Computer Science curricula are still churning out students who are not even exposed to security. This talk will address the lack of emphasis on information security in Computer Science curricula, how CS curricula have an obligation, how to gradually fix the problem by integrating security into many Computer Science undergraduate and graduate classes, and success stories from students. This talk will also discuss what Tufts and Brandeis are currently working on to further address the security education problem by creating a joint cyber security and policy program that spans multiple departments. Additional points and feedback from the audience are encouraged to help with the issue. All are encourage to attend to submit your feedback to help!&lt;br /&gt;
&lt;br /&gt;
Presenters: &lt;br /&gt;
&lt;br /&gt;
Ming Chow - @0xmchow &lt;br /&gt;
&lt;br /&gt;
Ming Chow is a Senior Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He was a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World, DEF CON, Intel, SOURCE Conference, and BSides Boston. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2014 and 2015.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin - @wr0 &lt;br /&gt;
&lt;br /&gt;
Roy Wattanasin is an adjunct faculty at Brandeis University in both the Health and Medical Informatics and Information Security graduate programs. He spends most of his time leading, teaching and developing information security programs, finding vulnerabilities, performing incident response and working on many projects. Roy has spoken at many conferences including RSA, ISSA International, Source Conference, Braintank, Cyber Security World, OWASP and the Security BSides conferences. He is also a healthcare information security professional. He was a mentor for a Proving Ground speaker at BSides Las Vegas in 2015. &lt;br /&gt;
&lt;br /&gt;
 '''May 4, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229788205/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Slightly different [http://www.akamai.com/html/about/locations.html Akamai] location: 90 Broadway, Cambridge, MA 02142 between Meadhall and the Mariott&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZAP''' - '''Dan Cornell'''&lt;br /&gt;
&lt;br /&gt;
There are a number of reasons to use source code to assist in web application penetration testing such as making better use of penetration testers’ time, providing penetration testers with deeper insight into system behavior, and highlighting specific sections of so development teams can remediate vulnerabilities faster. Examples of these are provided using the open source ThreadFix plugin for the OWASP ZAP proxy and dynamic application security testing tool. These show opportunities attendees have to enhance their own penetration tests given access to source code.&lt;br /&gt;
&lt;br /&gt;
This presentation covers the “ABCs” of source code assisted web application penetration testing: covering issues of attack surface enumeration, backdoor identification, and configuration issue discovery. Having access to the source lets an attacker enumerate all of the URLs and parameters an application exposes – essentially its attack surface. Knowing these allows pen testers greater application coverage during testing. In addition, access to source code can help to identify potential backdoors that have been intentionally added to the system. Comparing the results of blind spidering to a full attack surface model can identify items of interest such as hidden admin consoles or secret backdoor parameters. Finally, the presentation examines how access to source code can help identify configuration settings that may have an adverse impact on the security of the deployed application.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell is a globally recognized application security expert, Dan Cornell holds over 15 years of experience architecting, developing and securing web-based software systems. As the Chief Technology Officer and a Principal at Denim Group, Ltd., he leads the technology team to help Fortune 500 companies and government organizations integrate security throughout the development process. He is also the original creator of ThreadFix, Denim Group's industry leading application security program management platform. Cornell was Principal Investigator as Denim Group researched and developed the Hybrid Analysis Mapping (HAM) technology that lies at the heart of ThreadFix, through a Small Business Innovation Research (SBIR) contract with the Department of Homeland Security's Science and Technology Directorate.&lt;br /&gt;
&lt;br /&gt;
More information at: http://www.denimgroup.com/about_team_dan.html&lt;br /&gt;
&lt;br /&gt;
 '''April 6, 2016''' - Cambridge - [http://www.meetup.com/owaspboston/events/229223967/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway, Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:00 '''Runtime Application Self-Protection (RASP) Tools''' - '''Kunal Anand'''&lt;br /&gt;
&lt;br /&gt;
This talk will highlight the latest in AppSec and dive into a different kind of solution called Runtime Application Self-Protection (RASP). We'll also explore a new methodology called language theoretic security (LANGSEC) and explain how it can outperform existing approaches like pattern matching, regular expressions, etc. This talk will lay the foundation via informal and formal theory how lexers, tokenizers and parsers work. We’ll move onto constructing an open source toolchain to analyzing data and exploring interactive data visualizations. Along the way, we’ll cover performance tradeoffs and discuss the challenges of modern application security.&lt;br /&gt;
&lt;br /&gt;
Kunal Anand is the co-founder and CTO of Prevoty, a runtime application security platform. Prior to that, he was the Director of Technology at the BBC Worldwide, overseeing engineering and operations across the company’s global Digital Entertainment and Gaming initiatives. Kunal also has several years of experience leading security, data and engineering at Gravity, MySpace and NASA’s JetPropulsion Laboratory. His work has been featured in Wired Magazine and Fast Company. Kunal received a B.S. from Babson College.&lt;br /&gt;
&lt;br /&gt;
=== Past Training ===&lt;br /&gt;
&lt;br /&gt;
 '''March 16, 2016''' - Burlington - [http://www.meetup.com/owaspboston/events/229156529/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Demandware, Burlington.&lt;br /&gt;
&lt;br /&gt;
6:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
6:30 '''Software Security by the Numbers''' - '''Chris Eng'''&lt;br /&gt;
&lt;br /&gt;
Deep dive into data we’ve collected about the state of software security in 2016 &lt;br /&gt;
* Based on scans of 200,000+ applications over an 18-month period &lt;br /&gt;
* How different industries and programming languages compare to one another &lt;br /&gt;
* Vulnerability remediation habits and patterns &lt;br /&gt;
* Three characteristics of a successful AppSec program &lt;br /&gt;
&lt;br /&gt;
Chris Eng is vice president of research at Veracode. In this role, he leads the team responsible for integrating security expertise into all aspects of Veracode’s technology. Throughout his career, he has led projects breaking, building, and defending web applications and commercial software for some of the world’s largest companies. Chris is a frequent speaker at premier industry conferences, where he has presented on a diverse range of topics, including cryptographic attacks, agile security, mobile application security, and security metrics. He has been interviewed by Bloomberg, Fox Business, CBS, and other media outlets worldwide.&lt;br /&gt;
&lt;br /&gt;
 '''January 26, 2016''' - Waltham - [http://www.meetup.com/owaspboston/events/228202040/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Waltham.  Trapelo Rd. exit from Rt. 128, toward Lincoln. The parking lot entrance is on the right, at the first traffic light. Drive around to the front of the office complex, facing the highway. Enter under the clock tower. Park in the front of the building and enter in the main building lobby, continue down the hallway and you will see the innovation center, enter in the large glass doors. &lt;br /&gt;
&lt;br /&gt;
7:00 '''News, OWASP tools, documents review'''&lt;br /&gt;
&lt;br /&gt;
7:20 '''What Security Testing Tools Miss'''&lt;br /&gt;
&lt;br /&gt;
Black Duck Software presents - Static analysis, dynamic analysis, and other testing tools are all essential weapons against adversaries.  But for the 80%+ of companies worldwide that use open source software in their application development these tools are ineffective in identifying and mitigating open source security risks . This presentation will cover:&lt;br /&gt;
&lt;br /&gt;
The value of static and dynamic tools, and where they best fit in the Secure Development Lifecycle          &lt;br /&gt;
&lt;br /&gt;
Why these tools are not useful in identifying known vulnerabilities in open source components          &lt;br /&gt;
&lt;br /&gt;
Controls development and security professionals can deploy to select, detect, manage and monitor open source for existing and newly disclosed vulnerabilities&lt;br /&gt;
&lt;br /&gt;
Food will be provided by Constant Contact.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2015''' - Cambridge - [http://www.meetup.com/owaspboston/events/226394218/ Meetup]&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 150 Broadway &lt;br /&gt;
Cambridge, MA 02142 (aka 8 Cambridge Center)&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
Attendee interaction is always mentioned as a high value at meetings and was great at the MetroWest meetings, so we're doing that at Akamai this month. Some discussion starters so far: SSL certificate impacts from CA/Browser alliance decisions and SHA1 weakness; mutual (client) SSL, javascript client and server side; what the heck is threat intelligence, dev ops and faster secure SDLC.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Metrowest&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 20, 7:00 pm&lt;br /&gt;
&lt;br /&gt;
Location: Constant Contact, Innovation Center, Reservoir Place, 1601 Trapelo Road, Waltham, MA 02451&lt;br /&gt;
&lt;br /&gt;
7:00 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:30 '''Access in Maliceland - Risk Based Access Control''' - '''Gunnar Peterson'''&lt;br /&gt;
&lt;br /&gt;
John Lambert observed attackers win because while defenders think in lists, attackers think in graphs. Access control systems divide the system a priori into secure and insecure states. But that’s only worth the paper its printed on. A  Attackers see the system as it is, for attackers, the access control scheme is the beginning of the game not the end. Determined attackers seek out access control models and then find holes that they can leverage. Access control systems that purport to protect the system are built on assumptions from which reality diverges. Application security needs a new approach to access control- adding feedback loops for risk based decisions,  fine-grained, dynamic access control. &lt;br /&gt;
&lt;br /&gt;
Security is a business with a very long list of issues and requirements. The spreadsheets are miles long. This makes it essential to find reusable solution patterns that can address multiple problems.This presentation looks at both medium term improvements and code examples to improve access control decisions and overall security today&lt;br /&gt;
&lt;br /&gt;
Gunnar Peterson ([https://twitter.com/oneraindrop @oneraindrop]) focuses on security architecture consulting and training. Experience includes Associate Editor for IEEE Security &amp;amp; Privacy Journal, a Microsoft MVP for App security, an IANS Research Faculty member, a Securosis Contributing Analyst, and a Visiting Scientist at Carnegie Mellon Software Engineering Institute. He maintains a popular information security blog at http://1raindrop.typepad.com.&lt;br /&gt;
&lt;br /&gt;
 '''July 2015''' - Cambridge&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 8, 6:30 pm  ''NOTE: It's the second Wednesday this month.''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Interactive Discussions (Come and ask your questions!)''' &lt;br /&gt;
&lt;br /&gt;
 '''June 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Put Down the Megaphone: Effective Security Advocacy Without the Shouting''' - '''Darren Meyer'''&lt;br /&gt;
&lt;br /&gt;
10 years’ experience in the InfoSec community--including work with organizations in many verticals, in sizes ranging from startups to Fortune 50 enterprises, leading Application Security teams, building and delivering security instruction to developers, managers, and InfoSec professionals—has taught me the importance of crafting advocacy for different audiences. In this talk, I share my experiences in learning to be an effective advocate with three key audiences: developers, management, and non-technical staff.&lt;br /&gt;
&lt;br /&gt;
Darren is an Application Security advocate and researcher, technology hobbyist, and maker. He loves to learn, teach, nerd out, and inflict terrible puns on people. His background includes logistics, software development, and an assortment of information security roles including leading AppSec programs and professional security instruction targeting developers, managers, and InfoSec professionals.&lt;br /&gt;
&lt;br /&gt;
 '''May 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How the crowd is discovering critical vulns missed by traditional methods''' - '''Leif Dreizler'''&lt;br /&gt;
&lt;br /&gt;
State of the art security programs are turning to bug bounties to leverage a vast array of skill-sets and knowledge. Learn why these programs work, when to deploy them, and how you can bring these new application security testing capabilities into your own organization. The speaker will discuss real world examples from bug bounties and focus on cases where business logic flaws and high priority vulnerabilities were found ... even with existing security testing processes in place. &lt;br /&gt;
&lt;br /&gt;
Attendees will learn:&lt;br /&gt;
&lt;br /&gt;
Testing methods deployed by our crowd that help them find bugs the scanners miss&lt;br /&gt;
&lt;br /&gt;
Examples of the high quality of bugs our crowd is finding, including P1'sTrends which vulnerability types are found most often and whyWhat is the ROI on the pay for performance modelWhere does the SDLC merge into crowdsourced testing&lt;br /&gt;
&lt;br /&gt;
Leif Dreizler is a Senior Security Engineer at Bugcrowd, the innovator in crowdsourced security testing for the enterprise. Prior to joining Bugcrowd, Leif was a Senior Application Security Engineer at Redspin, performing application security assessments. During his time at Redspin he also served as the Application Team Lead, liaising with clients at the engineering and sales level. He has also made minor contributions to the Firebug project. Leif attended the University of California, Santa Barbara where he studied Computer Science. Leif recently spoke to the NYC Security Meet-up group.&lt;br /&gt;
&lt;br /&gt;
 '''April 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler Will show some actual examples and patterns of SQL Injection attempts&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Are You An Imposter? Me too!''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
Many people in the information security field feel like a fraud, or an imposter. In reality, we often know far more, and are capable of far more than we believe we do. There is so much to know and we constantly hear about the latest groundbreaking research done by others, which makes us feel less important or worthy. Let’s talk about what Imposter Syndrome is, its prevalence, and then we can start to realize just how capable we are and go forward with the confidence in the field.&lt;br /&gt;
&lt;br /&gt;
 '''March 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, March 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News, views, announcements, conversation'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Prioritizing Web Application Vulnerabilities – A Hacker’s Perspective''' - '''Nick Silver'''&lt;br /&gt;
&lt;br /&gt;
The best application risk models capture not only the technical risk factors, but also the business context in which an asset lives.  Traditionally, this is done by auditing application owners on an array of questions in order to properly classify the asset and its data – but that takes time which could be better spent elsewhere.  We interviewed dozens of hackers and asked them which vulnerabilities they would look for first depending on the type of attack they wanted to carry out.  We’ll walk through several examples of how to use this data as a shortcut means for prioritizing risk without the need for any pesky audit questionnaires.&lt;br /&gt;
&lt;br /&gt;
Nick Silver is a Senior Solutions Architect with WhiteHat Security.  He is responsible for translating business requirements into technical ones and assisting businesses in implementing web security programs.  Previously, Nick led a team in WhiteHat’s Threat Research Center where they were responsible for testing more than 2,000 of their customers’ websites for vulnerabilities.  &lt;br /&gt;
&lt;br /&gt;
 '''February 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, announcements''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''Incident Response and Web Application Security - Stories from the Trenches''' - '''Fred House and Joe Ceirante'''&lt;br /&gt;
&lt;br /&gt;
Mandiant has conducted numerous incident response engagements throughout its history, including a record number of 200 incidents in 2014. Mandiant consultants Fred House and Joe Ceirante will discuss case studies and trends Mandiant has observed in relation to web application security.&lt;br /&gt;
 &lt;br /&gt;
Topics will include the types of threat actors that target web applications, the techniques they use to compromise web applications, and the activities they perform once inside the network. Techniques for detecting and mitigating web compromises will also be reviewed. All content will be derived from the real-world compromises that Mandiant has investigated.&lt;br /&gt;
&lt;br /&gt;
 '''January 2015'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 7, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News review, risk analysis of Poodle''' - '''Jim Weiler'''&lt;br /&gt;
 &lt;br /&gt;
7:00 '''How a Hacker Views Your Web Site''' - '''Patrick Laverty'''&lt;br /&gt;
&lt;br /&gt;
''The most popular presentation of BASC 2014''&lt;br /&gt;
&lt;br /&gt;
As defenders, we have to be right 100% of the time where an attacker only needs to be right once. The attack surface of a modern web site is incredibly large and we need to be aware of all of it. Additionally, individual attacks may not always be effective but sometimes using them together can gain the desired effect. In this talk, we’ll take a look at the whole attack surface for a typical web site and the various ways that an attacker will use to compromise a site.&lt;br /&gt;
&lt;br /&gt;
 '''December 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, December 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 '''News and Views You Can Use and Abuse''' - '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
* Some thoughts and analysis on some current app security news and other stuff&lt;br /&gt;
* Adobe password breach&lt;br /&gt;
* Reducing Web Application Firewall SQL injection false positives&lt;br /&gt;
 &lt;br /&gt;
7:15 '''Swift and Security''' - '''Ming Chow'''&lt;br /&gt;
 &lt;br /&gt;
Apple is pushing its new programming language Swift for iOS development and for many good reasons.  This talk will discuss what the language has right in terms of security, the old and new security pitfalls, and what developers need to be aware of moving forward with using the new language.  The fact to the matter is, iOS isn't going away, iOS developers will need to learn and use Swift, and there will be a big rush of Swift-based apps: we might as well learn how to do it right the first time around.&lt;br /&gt;
 &lt;br /&gt;
Ming Chow is an Instructor at the Department of Computer Science, Tufts University. Ten years of web development experience.&lt;br /&gt;
Specialties: Web and Mobile Development, Web and Mobile Security&lt;br /&gt;
&lt;br /&gt;
 '''July 2014'''&lt;br /&gt;
&lt;br /&gt;
Topics: '''Grails Security''' and '''Validating Cross-Site Scripting Vulns with xssValidator'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Cyrus Malekpour''' and '''John Poulin'''&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic 1: ''Grails Security''&lt;br /&gt;
&lt;br /&gt;
Grails is a framework developed for Groovy in the vein of Rails for Ruby. It provides a lot of features for web app security, but does it do enough? What might you need to implement yourself, and what might be provided? This presentation will discuss tips on securing Grails applications, including tools that the framework provides by default for security. It'll also discuss several shortcomings in the current toolset, and how you can avoid them.&lt;br /&gt;
 &lt;br /&gt;
Cyrus Malekpour (@cmalekpour) is currently interning at nVisium, working on web app development and security. He's currently an undergraduate student at the University of Virginia, where he's studying computer science with an emphasis on security and backend development. &lt;br /&gt;
 &lt;br /&gt;
Topic 2: ''Validating Cross-Site Scripting Vulns with xssValidator''&lt;br /&gt;
 &lt;br /&gt;
xssValidator is a tool developed to automate the testing and validation of Cross-Site Scripting (xss) vulnerabilities within web applications. Automated scanners tend to report large amounts of false-positives, and as consultants we're forced spending our time trying to verify these findings. xssValidator leverages scriptable web-browsers such as PhantomJS and Slimer.js to automatically validate these findings.&lt;br /&gt;
 &lt;br /&gt;
John Poulin is an application security consultant for nVisium who specializes in web application security. He worked previously as a web developer and software engineer that focused on building multi-tier web applications. When he's not hacking on web apps, John spends his time building tools to help him hack on web apps! You can find him on twitter: @forced_request and on myspace: REDACTED.&lt;br /&gt;
&lt;br /&gt;
 '''June 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection and the OWASP Zed Attack Proxy (ZAP)'''&lt;br /&gt;
&lt;br /&gt;
Presenters: '''Rob Cheyne and Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 4, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
6:30 - general networking, news discussion, announcements.&lt;br /&gt;
&lt;br /&gt;
7:00 - main presentations&lt;br /&gt;
&lt;br /&gt;
The June 4th meeting will be the second in our series of 2014 training meetings. Rob Cheyne will continue explaining and exploring SQL Injection by conducting an actual injection attack.&lt;br /&gt;
&lt;br /&gt;
This will be a demo-based discussion to get into the mindset of an attacker, and show how an attacker goes after a site. Demo will include: &lt;br /&gt;
&lt;br /&gt;
* BurpProxy demo &lt;br /&gt;
* Common authentication flaws &lt;br /&gt;
* SQL Injection Demo that shows the process and how it builds to a full compromise&lt;br /&gt;
&lt;br /&gt;
'''Rob Cheyne''' is currently CEO of Big Brain Security. In addition to security consulting for Fortune 500 customers, he was the author of LC4, a version of the award-winning L0phtCrack password auditing tool, and he also worked on the code scanning technology that was eventually spun off as Veracode. Rob was at @stake from the very first customer all the way through to the $50M acquisition by Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Jim Weiler''' will introduce the OWASP Zed Attack Proxy (ZAP). This is a very powerful free OWASP intercepting proxy that lets you see, analyze, change, replay etc. every browser request and response, analyze your session, scan and attack web sites, save the results and run reports. We can't cover all the functionality but we'll show some practical tips and techniques.&lt;br /&gt;
&lt;br /&gt;
Pizza, salad and soda courtesy of Akamai&lt;br /&gt;
&lt;br /&gt;
 '''March 2014'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Training: SQL Injection, WebGoat, Cross Site Request Forgery'''&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
When: Wednesday, March 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
There will be three training sessions:&lt;br /&gt;
&lt;br /&gt;
One will be on SQL Injection - intro, detection, prevention, scanning and false positives. This is the most serious web application vulnerability.&lt;br /&gt;
&lt;br /&gt;
The second will be on OWASP WebGoat. WebGoat is a deliberately insecure web application maintained by OWASP designed to teach web application security lessons. You can install and practice with WebGoat in either J2EE or in ASP.NET. In each lesson, users must demonstrate their understanding of a security issue by exploiting a real vulnerability in the WebGoat applications. There are hints and 39 different lesson plans on various vulnerabilities and technologies. We won't cover all of them of course!&lt;br /&gt;
&lt;br /&gt;
The third will be on Cross Site Request Forgery - not a hack really, it's just the way the web works. But it causes apps to do legitimate things that you didn't ask them to do.&lt;br /&gt;
&lt;br /&gt;
Pizza and drinks provided by Akamai.&lt;br /&gt;
&lt;br /&gt;
 '''January 2014'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, January 8, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''JavaScript Verification: From Browsers to Pages'''&lt;br /&gt;
&lt;br /&gt;
Modern web browsers implement a &amp;quot;private browsing&amp;quot; mode that is intended to leave behind no traces of a user's browsing activity on their computer. This feature is in direct tension with support for *extensions*, which let users add third-party functionality into their browser. I will discuss the scope of this problem, present our approach to verifying extensions' compliance with private browsing mode, and sketch our findings on several real, third-party extensions. I will then briefly describe the toolkit underlying our approach, and end with a sketch of a newer project, adapting this approach to the very different-seeming problem of statically catching errors when using the jQuery library.&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Benjamin Lerner'''&lt;br /&gt;
&lt;br /&gt;
Benjamin Lerner has just completed a post-doctoral research position in the PLT group at Brown University, and is now a lecturer at Northeastern University.  His research examines the challenges of analyzing client-side web programming, from the behavior of web pages down through the semantics of the browser.  He received a PhD in Computer Science from the University of Washington in 2011, building a platform to analyze conflicts between browser extensions, and a B.S. in Computer Science and Mathematics from Yale University.&lt;br /&gt;
&lt;br /&gt;
 '''November 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, November 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Attacking iOS Applications'''  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://www.slideshare.net/kfosaaen/i-os-gcandpb On slideshare]&lt;br /&gt;
&lt;br /&gt;
This presentation will cover the basics of attacking iOS applications (and their back ends) using a web proxy to intercept, modify, and repeat HTTP/HTTPS requests. (The proxy used during research was Burp; however, any HTTP intercepting proxy such as OWASP ZAP could be used) From setting up the proxy to pulling data from the backend systems, this talk will be a great primer for anyone interested in testing iOS applications at the HTTP protocol level. There will be a short (2 minute) primer on setting up the intercepting proxy, followed by three practical examples showing how to intercept data headed to the phone, how to modify data heading to the application server, and how to pull extra data from application servers to further an attack. All of these examples will focus on native iOS apps (Game Center and Passbook) and/or functionality (Passbook Passes).&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Karl Fosaaen'''&lt;br /&gt;
&lt;br /&gt;
Karl is a senior security consultant at NetSPI. This role has allowed Karl to work in a variety of industries, including financial services, health care, and hardware manufacturing. Karl specializes in network and web application penetration testing. In his spare time, Karl helps out as an OPER at THOTCON and a swag goon at DEF CON.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2013'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, October 2, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Topic: '''Abusing NoSQL Databases'''&lt;br /&gt;
&lt;br /&gt;
The days of selecting from a few SQL database options for an application are over. There is now a plethora of NoSQL database options to choose from: some are better than others for certain jobs. There are good reasons why developers are choosing them over traditional SQL databases including performance, scalabiltiy, and ease-of-use. Unfortunately like for many hot techologies, security is largely an afterthought in NoSQL databases. This short but concise presentation will illustrate how poor the quality of security in many NoSQL database systems is. This presentation will not be confined to one particular NoSQL database system. Two sets of security issues will be discussed: those that affect all NoSQL database systems such as defaults, authentication, encryption; and those that affect specific NoSQL database systems such as MongoDB and CouchDB. The ideas that we now have a complicated heterogeneous problem and that defense-in-depth is even more necessary will be stressed. There is a common misconception that SQL injection attacks are eliminated by using a NoSQL database system. While specifically SQL injection is largely eliminated, injection attack vectors have increased thanks to JavaScript and the flexibility of NoSQL databases. This presentation will present and demo new classes of injection attacks. Attendees should be familiar with JavaScript and JSON. &lt;br /&gt;
&lt;br /&gt;
Presenter: '''Ming Chow'''&lt;br /&gt;
&lt;br /&gt;
Ming Chow (@tufts_cs_mchow) is a Lecturer at the Tufts University Department of Computer Science. His areas of work are in web and mobile engineering and web security. He teaches courses largely in the undergraduate curriculum including the second course in the major sequence, Web Programming, Music Apps on the iPad, and Introduction to Computer Security. He was also a web application developer for ten years at Harvard University. Ming has spoken at numerous organizations and conferences including the High Technology Crime Investigation Association - New England Chapter (HTCIA-NE), the Massachusetts Office of the Attorney General (AGO), John Hancock, OWASP, InfoSec World (2011 and 2012), DEF CON 19 (2011), the Design Automation Conference (2011), Intel, and the SOURCE Conference (Boston 2013). Ming's projects in information security include building numerous CTF challenges, Internet investigations, HTML5 and JavaScript security, and Android forensics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2013 - Joint Meeting with [http://www.meetup.com/Boston-cloud-services/ Boston Cloud Services]''' &lt;br /&gt;
&lt;br /&gt;
When: Tuesday, September 10, 6 pm&lt;br /&gt;
&lt;br /&gt;
Location: Microsoft NERD Center ''(not our usual location)''&lt;br /&gt;
&lt;br /&gt;
'''Note: This is a joint meeting. Please register at [http://www.meetup.com/Boston-cloud-services/ the Boston Cloud Services meetup page] if you plan to attend.'''&lt;br /&gt;
&lt;br /&gt;
There will be two presentations at this meeting:&lt;br /&gt;
&lt;br /&gt;
Topic: '''People Centric Security (PCS)'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Nick Stamos'''&lt;br /&gt;
&lt;br /&gt;
People Centric Security (PCS) is a new security model, presented as part of Gartner's Maverick Research 2 year ago. PCS is well suited for Cloud Business/Consumer services such as Dropbox, Google Drive, SkyDrive, etc. PCS enables users to have what they desire, and provides enterprises what they require for data governance and compliance. Nick Stamos co-founded his fourth company, nCrypted Cloud in July of 2012. His past startups include Verdasys, Phase Forward (IPO FY2004, $685M Oracle Acquisition 2010), and Amulet. He studied at Tufts University where he received a BSEE and MSEE.&lt;br /&gt;
&lt;br /&gt;
Topic: '''SSL Certs'''&lt;br /&gt;
&lt;br /&gt;
Presenter: '''Jim Weiler'''&lt;br /&gt;
&lt;br /&gt;
Practical experiences with issuing and risk assessing SSL certs for enterprise applications on a cloud provider: who creates the CSR, how do you protect the private key on the cloud server, certs on cloud provider managed load balancers vrs 3rd party managed app servers, roles and responsibilities of cloud IT, 3rd party developer IT, enterprise IT and service providers. Jim Weiler is Application Security Architect at Starwoods Hotels and the Chapter Leader of OWASP Boston.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2013 - Doubleheader!'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, July 10, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Topic: '''RailsGoat'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Ken Johnson'''&lt;br /&gt;
&lt;br /&gt;
Abstract: While working to secure rails applications in a truly Agile development environment, it became clear that the Rails and Ruby ecosystem needed attention from the security community in the form of free and open training, and the events that have transpired within the last few months have only reinforced that belief. [http://railsgoat.cktricky.com/ RailsGoat] is an attempt to bring attention to both the problems that most frequently occur in Rails as well as the solutions for remediation. To accomplish this, we've built a vulnerable Rails application that aligns with the OWASP Top 10 and can be used as a training tool for Rails-based development shops.&lt;br /&gt;
&lt;br /&gt;
Topic: '''PhoneGap on Android'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PhoneGap is a widely used framework that allows developers to rapidly build cross-platform mobile applications using HTML5, JavaScript, and CSS. Using PhoneGap plugins, developers can call native platform APIs from browser-like applications using JavaScript. This approach introduces vulnerabilities that are not typically as prevalent within native Android applications, warranting a fresh look at the way we view mobile applications. In this presentation, we will take a deep look at the Android implementation of the framework and we will examine the overall attack surface for applications. Real-world examples of vulnerable applications will be demonstrated as well in order to provide context, entertainment, and enjoyment.&lt;br /&gt;
&lt;br /&gt;
About the Speakers:&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the former Manager of LivingSocial.com's application security team where he built their security program before leaving for his true home as the CTO of nVisium Security, a VA-based application security company. Ken is the primary developer of the Web Exploitation Framework and contributes to other open source application security projects as often as time permits. He has spoken at AppSec DC 2010 and 2012, OWASP NoVA and Phoenix chapters, Northern Virginia Hackers Association (NoVAH) and is a contributor to the Attack Research team.&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a VA-based application security company. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful security initiatives. He is an active Android security researcher/tinkerer, and has a keen interest in identifying security issues and trends on a large scale. Jack is a leader and founder of the OWASP Mobile Security Project. He is the lead developer for the OWASP GoatDroid project, and is the chairman of the OWASP Northern Virginia chapter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''We see the future…and it isn’t pretty'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Andrea Mulligan, Sr. Director at Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future. &lt;br /&gt;
&lt;br /&gt;
 '''May 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Systems Thinking + Web Security'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Akamai'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Akamai will present on ‘Systems Thinking + Web Security’. There will also be an audience review exercise facilitated by the Akamai presenters.  This is a great chance to hear some interesting perspectives on web security from Akamai, who handles about one third of all internet traffic.&lt;br /&gt;
&lt;br /&gt;
 '''April 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Sonotype'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
* Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important. &lt;br /&gt;
* Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.&lt;br /&gt;
* OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are. &lt;br /&gt;
* OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.&lt;br /&gt;
* OSS Component Policy Examples&lt;br /&gt;
* Example Application Compositions Reports&lt;br /&gt;
* Example Use cases IDE, CI, repository, production applications&lt;br /&gt;
* Discussion&lt;br /&gt;
&lt;br /&gt;
About Sonatype:&lt;br /&gt;
&lt;br /&gt;
Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository. &lt;br /&gt;
&lt;br /&gt;
 '''March 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''What is BSIMM?'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Nabil Hannan'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.&lt;br /&gt;
 &lt;br /&gt;
The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.  &lt;br /&gt;
&lt;br /&gt;
BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers. &lt;br /&gt;
&lt;br /&gt;
The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''BroBot'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Eric Kobrin, Akamai'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.&lt;br /&gt;
 &lt;br /&gt;
His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:&lt;br /&gt;
&lt;br /&gt;
* Vulnerable system discovery&lt;br /&gt;
* Zombie compromise&lt;br /&gt;
* Control structure&lt;br /&gt;
* Attack traffic&lt;br /&gt;
* Mitigation steps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Third-Party Application Analysis: Best Practices and Lessons Learned'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Chad Holmes, Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.&lt;br /&gt;
&lt;br /&gt;
The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some.  The order of the presentation is:&lt;br /&gt;
&lt;br /&gt;
·         Adoption rates of externally developed software&lt;br /&gt;
&lt;br /&gt;
·         The risk within those apps&lt;br /&gt;
&lt;br /&gt;
·         Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)&lt;br /&gt;
&lt;br /&gt;
·         Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)&lt;br /&gt;
&lt;br /&gt;
·         Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)&lt;br /&gt;
&lt;br /&gt;
·         Best Practices for high rates of adoption&lt;br /&gt;
&lt;br /&gt;
·         Lessons Learned and Recommendations&lt;br /&gt;
&lt;br /&gt;
Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.&lt;br /&gt;
&lt;br /&gt;
 '''June 2012'''&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker '''Will Vandevanter - Rapid 7'''&lt;br /&gt;
&lt;br /&gt;
'''Fingerprinting web applications of all kinds'''&lt;br /&gt;
&lt;br /&gt;
This turbo talk will introduce a new Metasploit module that fingerprints &amp;quot;known&amp;quot; web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others. &lt;br /&gt;
&lt;br /&gt;
Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 '''May 31 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Jobspring, Boston. 545 Boylston st. &lt;br /&gt;
&lt;br /&gt;
Speaker - '''Glenn Gramling, Vice President, Cenzic'''&lt;br /&gt;
&lt;br /&gt;
“Cloudy with a Chance of Hack”&lt;br /&gt;
&lt;br /&gt;
Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of &amp;quot;stormy weather.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Glenn Gramling is responsible for global sales and business development for Cenzic’s  application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 11, 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker - '''David Eoff, Senior Product Marketing Manager, HP Enterprise Security'''&lt;br /&gt;
&lt;br /&gt;
David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.&lt;br /&gt;
&lt;br /&gt;
Topic - '''Gray, the New Black:  Gray-Box Vulnerability Testing'''&lt;br /&gt;
&lt;br /&gt;
Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software:  Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST).  While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions:  information about the inner workings and behavior of applications undergoing DAST and SAST analysis.&lt;br /&gt;
 &lt;br /&gt;
This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers.  It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.&lt;br /&gt;
&lt;br /&gt;
 '''March 8, 2012, with the Boston Security Meetup group'''&lt;br /&gt;
&lt;br /&gt;
Location - [http://maps.google.com/maps?q=Jobspring+Partners,+Boylston+Street,+Boston,+MA&amp;amp;hl=en&amp;amp;sll=42.362243,-71.081628&amp;amp;sspn=0.019549,0.037594&amp;amp;oq=jobspring&amp;amp;t=v&amp;amp;hq=Jobspring+Partners,&amp;amp;hnear=Boylston+St,+Boston,+Massachusetts&amp;amp;z=17 JobSpring, Boylston St.]&lt;br /&gt;
&lt;br /&gt;
Topic - '''Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers'''&lt;br /&gt;
&lt;br /&gt;
Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.&lt;br /&gt;
 &lt;br /&gt;
Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.&lt;br /&gt;
 &lt;br /&gt;
Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.&lt;br /&gt;
 &lt;br /&gt;
The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.&lt;br /&gt;
 &lt;br /&gt;
Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come. &lt;br /&gt;
&lt;br /&gt;
 '''December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room'''&lt;br /&gt;
&lt;br /&gt;
'''Jeremiah Grossman – Founder and CTO WhiteHat Security'''&lt;br /&gt;
 &lt;br /&gt;
Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
 '''September 14 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz   -  OWASP O2 Platform'''&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). &lt;br /&gt;
&lt;br /&gt;
 '''September 7 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Adriel Desautels –  Differences between Penetration Testing and Vulnerability Scanning'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July  2011'''&lt;br /&gt;
&lt;br /&gt;
'''Anurag Agarwal, the founder of MyAppSecurity'''&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ==&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston &amp;lt;br /&amp;gt;&lt;br /&gt;
35 Wachusett Dr &amp;lt;br /&amp;gt;&lt;br /&gt;
Lexington, MA 02421 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/2017_BASC_Homepage Boston Application Security Conference 2017] &lt;br /&gt;
&lt;br /&gt;
[[2016 BASC Homepage|Boston Application Security Conference 2016]]&lt;br /&gt;
&lt;br /&gt;
[[2015 BASC Homepage|Boston Application Security Conference 2015]]&lt;br /&gt;
&lt;br /&gt;
[[2014 BASC Homepage|Boston Application Security Conference 2014]]&lt;br /&gt;
&lt;br /&gt;
[[2013 BASC Homepage|Boston Application Security Conference 2013]]&lt;br /&gt;
&lt;br /&gt;
[[2012 BASC Homepage|Boston Application Security Conference 2012]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boston OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Board of Directors''' &lt;br /&gt;
&lt;br /&gt;
* [mailto:lindaleigh.aberdale@owasp.org LindaLeigh Aberdale]&lt;br /&gt;
* [mailto:mark.arnold@owasp.org Mark Arnold] &lt;br /&gt;
* [mailto:tom.conner@owasp.org Tom Conner] &lt;br /&gt;
* [mailto:mike.perez@owasp.org Mike Perez]&lt;br /&gt;
* [mailto:roy.wattanasin@owasp.org Roy Wattanasin]&lt;br /&gt;
* [mailto:pedro.marcano@owasp.org Pedro Marcano]&lt;br /&gt;
* [mailto:Mark.Schlepphorst@owasp.org Mark Schlepphorst] &lt;br /&gt;
* [mailto:Ori.Zigindere@owasp.org Ori Zigindere] &lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] &lt;br /&gt;
[[Category:OWASP_Chapter]] &lt;br /&gt;
[[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Slides_Template&amp;diff=244784</id>
		<title>Template:2018 BASC:Presentaton Slides Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Slides_Template&amp;diff=244784"/>
				<updated>2018-11-01T20:54:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: Created page with &amp;quot;&amp;lt;div style=&amp;quot;margin-left: 10px;&amp;quot;&amp;gt;'''Slides'''&amp;lt;/div&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;margin-left: 10px;&amp;quot;&amp;gt;'''[[Media:{{{1}}}|Slides]]'''&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Info_Template&amp;diff=244783</id>
		<title>Template:2018 BASC:Presentaton Info Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Info_Template&amp;diff=244783"/>
				<updated>2018-11-01T20:54:19Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: revert&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=title&lt;br /&gt;
      2=Speaker Name __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
      3=optional extra such as | [[Media:2016_BASC_Succeeding_with_Automation.pptx|Slides]]&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
==={{{1}}}===&lt;br /&gt;
&amp;lt;div style=&amp;quot;margin-left: 10px;&amp;quot;&amp;gt;'''Presented by:''' [[2018_BASC_Speakers#{{{2}}}|{{{2}}}]]{{{3}}}&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Info_Template&amp;diff=244782</id>
		<title>Template:2018 BASC:Presentaton Info Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Info_Template&amp;diff=244782"/>
				<updated>2018-11-01T20:52:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;margin-left: 10px;&amp;quot;&amp;gt;'''[[Media:{{{1}}}|Slides]]'''&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Presentations&amp;diff=244781</id>
		<title>2018 BASC Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Presentations&amp;diff=244781"/>
				<updated>2018-11-01T20:50:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template|Presentations}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
We would like to thank our speakers for donating their time and effort to help make this conference successful.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|MSeVader: Outsmarting the WAF|Brent Dukes| | | }}&lt;br /&gt;
ModSecurity Evader (MSeVader) is a tool that assists offensive security testers in crafting payloads that evade ModSecurity WAF rules. A Burp Suite extension providing visual feedback in real time to rule violations, the attacker can tweak payloads before submitting them to the web server, ensuring they are not blocked. The demonstration of the tool will include techniques of fingerprinting the WAF, to determine specific threshold settings of the WAF rules, allowing the attacker to know whether the payload will be blocked without sending packets. This tool has been used to successfully discover WAF evading payloads to execute SQL injection, XSS, and inject web shells to a site behind a popular commercial cloud-based WAF solution, at maximum paranoia settings.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Painless Threat Modeling|Andrew Gronosky| | | }}&lt;br /&gt;
[[Media:PainlessThreatModeling.pptx|Slides]]&lt;br /&gt;
According to OWASP, threat modeling is one of the most valuable activities to ensure secure web application design. Yet leading resources on threat modeling make it look like a massive and complex up-front effort. This presentation will outline a practical approach to threat modeling that can be started in just a few working days and can produce productive collaboration between development and security teams.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|It Depends On....|Tania Ward and Kristen Pascale| | | }}&lt;br /&gt;
From the time we choose to rise each morning, to the time we finally rest our heads, almost every decision made in our daily lives, depends on something. When we understand these dependencies we can better control our responses. How a PSIRT manages its response is not black and white either, in fact the quality of a response correlates to the degree in which dependences are known and understood within the products which get released. As developers incorporate more open source and commercial third party components into their products, the complexity of these dependencies continue to increase which causes a downstream ripple effect on PSIRTs who are tasked with managing the responses for vulnerabilities reported in these dependencies. A framework for managing dependences is important so developers can understand the downstream impact of their decisions on PSIRTs while opening the door for PSIRTs to potentially shape those decisions. Further enforcing this dialogue through dedicated PSIRT controls, lays the foundation for a PSIRT response that truly shifts from reactive to proactive.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Navigating the Bug Bounty Marketplace|Bryan Brannigan| | | }}&lt;br /&gt;
Bug bounties are a marketplace and like all marketplaces, there are good sellers (researchers) and buyers (programs), and there bad sellers and buyers. There are resources everywhere to help researchers get going in this exciting world of bug hunting, but there are few resources available to help those running programs. But it is far worse to be a bad program than it is to be a bad researcher. Let's have a conversation about how Upserve went from no bounty program to launching a public program (and beyond!). We'll talk about the speedbumps and the lessons learned along the way. And you'll learn about how managing a successful bug bounty program is more about managing expectations and clear communication then it is about fixing security bugs.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|API Security Challenges|Angelo Castigliola| | | }}&lt;br /&gt;
APIs present enterprises with new risks and challenges to security. In this presentation, I will discuss a methodology to secure your enterprise's APIs. This methodology will include: Discovery (Breaking down your APIs into basic groups, The difference between Web App Discovery and API Discovery); Risk and Prioritization (Rapid Risk Assessment); Testing (Tools, Vulnerabilities); Gateways, Serverless, Microservices (Gateway vs. Service, Unique Requirements of API Services Require Specialized Testing); Key Take-Aways on Securing your API Environment (Have an API discovery and risk plan, Tools that worked on Web Apps need more help with APIs,&lt;br /&gt;
Newer technologies benefit from full stack testing techniques).&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond| | | }}&lt;br /&gt;
Workforce development is reliant on the combination of a subject-matter common language framework of projects and tasks. Job descriptions are then derived from this same framework of subject-matter project and tasks definition. A career development plan based on standardized projects and tasks; along with a culture that allows for psychological safety; will allow you to acquire and retain talent. When we combine daily processes of business operations derived from a subject-matter common language, in which all teammates know their role and the roles of others on the team (along with a culture that allows humans to think, feel and perceive without negative consequences) we can truly experience workforce development in any subject-matter profession. Come hear how in to achieve this success in cybersecurity. Between our technology and our theories we are showing that organizations can obtain cybersecurity talent in less than 60 days and retain them.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Modern Security Architecture with OpenID Connect|Brock Allen| | | }}&lt;br /&gt;
Modern applications require modern security and the OpenID Connect and OAuth2 security protocols are designed to meet this need. To achieve a modern security architecture you must then use something called a “security token service” that implements these protocols. In this session we will look at how applications are now architected to incorporate and use a token service for authentication thus providing single sign-on. We will also see how this same token service also provides tokens for securing Web APIs.  We will be using ASP.NET Core and the popular open source framework IdentityServer to illustrate these concepts.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|How Not to Fail Your DevSecOps Transformation|Eitan Worcel| | | }}&lt;br /&gt;
There is no silver bullet for a successful DevSecOps. Each organization has its own way of doing things and no two development groups are the same. The good news is you can learn from mistakes made by others, and avoid repeating those. In this session you will hear about their AppSec programs, their journey to shift their security to the left, their missteps, and the lessons learned.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Website Security – AppSec’s Partial Solution to a Complex Problem |Chris Olson| | | }}&lt;br /&gt;
Websites and mobile apps are the primary channel for how businesses communicate with customers and consumers. However, the significant risk they harbor continue to confound information security professionals for three reasons. First, a majority of website code is provided by unknown parties that execute outside the enterprise infrastructure. Second, these shadow IT resources are not addressed by app scanning services. Third, appsec teams don’t understand the composition of these digital assets and the risks posed to the enterprise. There’s a fundamental philosophy that these shadow IT resources are not part of websites and mobile apps, and therefore not appsec’s responsibility. And it shows. Digital-driven breaches occur with increasing regularity via compromised third-party vendors such as tag management systems, chat bots, content management systems, data management platforms, marketing analytics, video platforms, advertisements, and more. Making matters worse, bad actors leverage sophisticated targeting and obfuscation techniques to continuously evade security researchers and technologies. Considering that 50-95% of executing website code is typically delivered by third-parties, enterprises need to rethink website security. How can you secure code that application security tools—let alone, operations teams—don’t even see executing on the user’s device?&lt;br /&gt;
A real-time review of five popular websites will demonstrate the complexity of the digital environment and why breaches will continue to dominate headlines.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski and Jessica Boy| | | }}&lt;br /&gt;
The struggle is real before the pentest even starts; you have hundreds of web applications to test, dozens of managers looking for redacted pentest reports, and that one person who keeps coming to your desk for updates (daily). It’s a mad world. We’ve been there, so you don’t have to be! Join us as we present how we leveraged the power of Dynamic Application Security Testing (DAST), the concept of Tiering, and the power of automation to test what matters (and yes, everything matters – even internal applications). And how to use all that to make Pentesting Great Again! This is the one retrospective you won’t want to miss – key take-aways from working on AppSecurity for over 3 years. If you’ve been managing your issues in Excel, writing reports in Word, and are excited to spend your time actually testing applications, this talk is for you! We’re anticipating for a highly collaborative session and hope you’ll join - feedback, criticism and praise are all welcome!&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Voyages of the Security-Driven Enterprise|Katie Knowles| | | }}&lt;br /&gt;
You may have heard it said that security should work to enable the business. Easier said than done... how can a defensive practice provide growth through risk management? In this talk, we'll review three valuable roles security can play to fully integrate with the business it supports. Expect simple, quick-win strategies from our experience working with fellow defenders to translate between business needs, negotiate prioritization, and energize collaborative initiatives for new growth. Along the way, we'll cover realistic techniques to engage common obstacles and set course towards a security-driven enterprise.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Presentaton_Info_Template|Introduction to Android Security|Dzung Pham| | | }}&lt;br /&gt;
This presentation is an overview of Android security. The topics of Android framework, common application vulnerabilities, as well as penetration testing methods will be discussed. This presentation caters to people who are interested in learning about the fundamentals of Android security.&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template|Presentations}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Sponsor_Bar_Template&amp;diff=244616</id>
		<title>Template:2018 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Sponsor_Bar_Template&amp;diff=244616"/>
				<updated>2018-10-25T01:28:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: dell logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Optiv Logo.jpg|link=https://www.optiv.com/|299x91px|Optiv]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|317x104px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Dell_Logo_Blue_rgb-125x125.png|link=http://www.dell.com/|125x125px|Dell]]&amp;lt;/span&amp;gt;&lt;br /&gt;
[[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
            [[File:GoSecure_Artboard_1@2x_(002)998x242.png|link=https://gosecure.net|250x280px|GoSecure]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsor&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TWM_logo_for_Boston_OWASP_2018_-_white_(CP).jpg|link=http://TokenizeWhatMatters.com//|160x71px|TWM]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Auric-sys-int-2012 300x77.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
 	&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2018.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
	         Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dell_Logo_Blue_rgb-125x125.png&amp;diff=244615</id>
		<title>File:Dell Logo Blue rgb-125x125.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dell_Logo_Blue_rgb-125x125.png&amp;diff=244615"/>
				<updated>2018-10-25T01:27:17Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: Dell&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dell&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Dell_Logo_Blue_rgb-150x150.png&amp;diff=244614</id>
		<title>File:Dell Logo Blue rgb-150x150.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Dell_Logo_Blue_rgb-150x150.png&amp;diff=244614"/>
				<updated>2018-10-25T01:23:55Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: Dell&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dell&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244613</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244613"/>
				<updated>2018-10-25T00:59:50Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: final edit?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 1 }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Penetration Testing &amp;amp;amp; Network Defender Training Workshop|Penetration Testing &amp;amp;amp; Network Defender Training Workshop]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp;amp;amp; Vik Solem]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore.  Scoring in Bretton Woods.&amp;lt;/div&amp;gt;    &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 2 }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:30&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:30-2:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Penetration Testing &amp;amp;amp; Network Defender Challenge|Penetration Testing &amp;amp;amp; Network Defender Challenge]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp;amp;amp; Vik Solem]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker &amp;amp; Best Defender to be announced at close of conference.&amp;lt;/div&amp;gt;    &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Resume_Agenda_Template&amp;diff=244611</id>
		<title>Template:2018 BASC:Resume Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Resume_Agenda_Template&amp;diff=244611"/>
				<updated>2018-10-25T00:53:00Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Resume_Room|CyberSN Career Center]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;{{{1}}}&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244598</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244598"/>
				<updated>2018-10-24T12:11:51Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 1&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Penetration Testing &amp;amp;amp; Network Defender Training Workshop|Penetration Testing &amp;amp;amp; Network Defender Training Workshop]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp;amp;amp; Vik Solem]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;Initial briefing in Cranmore. Then Red Team moves to Jay Peak, while Blue Team remains in Cranmore.  Scoring in Bretton Woods.&amp;lt;/div&amp;gt;    &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 2&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;5&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:30&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:30-2:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Penetration Testing &amp;amp;amp; Network Defender Training Workshop|Penetration Testing &amp;amp;amp; Network Defender Training Workshop]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Phil Barrows, John Hammond &amp;amp;amp; Vik Solem]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;Participants can choose to occupy Jay Peak, Cranmore, or Bretton Woods.  Best Attacker &amp;amp; Best Defender to be announced at close of conference.&amp;lt;/div&amp;gt;    &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244460</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244460"/>
				<updated>2018-10-23T03:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 1&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Pen Testing &amp;amp;amp; Network Defenders: Briefing &amp;amp;amp; Red Team|Pen Testing &amp;amp;amp; Network Defenders]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Vic Solem &amp;amp;amp; Phil Barrows]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;12:30-2:00: Scoring&amp;lt;br/&amp;gt;2:00-2:30: Break&amp;lt;br/&amp;gt;2:30-4:00: Challenge&amp;lt;/div&amp;gt;    &lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Pen Testing &amp;amp;amp; Network Defenders: Briefing &amp;amp;amp; Red Team|Pen Testing &amp;amp;amp; Network Defenders]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Vic Solem &amp;amp;amp; Phil Barrows]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;12:30-2:00: Blue Team&amp;lt;br/&amp;gt;2:00-2:30: Break&amp;lt;br/&amp;gt;2:30-4:00: Challenge&amp;lt;/div&amp;gt;    &lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#Pen Testing &amp;amp;amp; Network Defenders: Briefing &amp;amp;amp; Red Team|Pen Testing &amp;amp;amp; Network Defenders]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#|Vic Solem &amp;amp;amp; Phil Barrows]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;12:30-2:00: Briefing &amp;amp;amp; Red Team&amp;lt;br/&amp;gt;2:00-2:30: Break&amp;lt;br/&amp;gt;2:30-4:00: Challenge&amp;lt;/div&amp;gt;    &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 2&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Erik Costlow }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244459</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244459"/>
				<updated>2018-10-23T03:05:09Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 1&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense: Scoring|Vic Solem &amp;amp;amp; Phil Barrows }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense: Blue Team|Vic Solem &amp;amp;amp; Phil Barrows }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense: Briefing &amp;amp;amp; Red Team|Vic Solem &amp;amp;amp; Phil Barrows }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 2&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244458</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244458"/>
				<updated>2018-10-23T02:53:19Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;!-- | colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 1&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense Workshop Briefing|  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|Session 2&amp;lt;br/&amp;gt;CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244457</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244457"/>
				<updated>2018-10-23T02:43:45Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-1:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.optiv.com/ Optiv]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 5:00-5:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 5:30-6:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense Workshop Briefing|  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 1:00-1:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 2:00-2:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 3:00-3:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 4:00-4:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244389</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244389"/>
				<updated>2018-10-19T14:03:53Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;  --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-17:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 17:30-18:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense Workshop Briefing|  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244388</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244388"/>
				<updated>2018-10-19T13:56:42Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;  --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-17:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 17:30-18:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense Workshop Briefing|  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244387</id>
		<title>Template:2018 BASC:Header Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244387"/>
				<updated>2018-10-19T13:21:04Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:Boston-Banner-468x60.gif|702x90px]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[2018 BASC Homepage|Home]] | [[2018 BASC Agenda|Agenda]] | &amp;lt;!-- [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] | [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit]  | --&amp;gt; [https://www.owasp.org/index.php/2018_BASC_Homepage/COC Code of Conduct] | [[2018 BASC Presentations|Presentations]] | [[2018 BASC Workshops|Workshops]] | [[2018 BASC Speakers|Speakers]]  | &amp;lt;!-- [URL_TBD Register] | --&amp;gt;[[Image:twitter_32.png|link=https://twitter.com/@BASConf]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Sponsor_Bar_Template}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244386</id>
		<title>Template:2018 BASC:Header Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244386"/>
				<updated>2018-10-19T13:20:20Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:Boston-Banner-468x60.gif|702x90px]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[2018 BASC Homepage|Home]] | [[2018 BASC Agenda|Agenda]] | &amp;lt;!-- [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] | --&amp;gt; [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit]  |  [https://www.owasp.org/index.php/2018_BASC_Homepage/COC Code of Conduct] | [[2018 BASC Presentations|Presentations]] | [[2018 BASC Workshops|Workshops]] | [[2018 BASC Speakers|Speakers]]  | &amp;lt;!-- [URL_TBD Register] | --&amp;gt;[[Image:twitter_32.png|link=https://twitter.com/@BASConf]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Sponsor_Bar_Template}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244363</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244363"/>
				<updated>2018-10-18T21:01:16Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: workshop agenda&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;  --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-17:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 17:30-18:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Advanced XXE Exploitation|Philippe Arteau }} &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Intro to Osquery - A Hands On Lab|Milan Shah }}  &lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |  &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color:#D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:30-1:00&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|PenTesting &amp;amp;amp; Net Defense Workshop Briefing|  }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Application Cartography and Defense|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| rowspan=&amp;quot;1&amp;quot; style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:15%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244361</id>
		<title>2018 BASC Agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Agenda&amp;diff=244361"/>
				<updated>2018-10-18T15:58:37Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Agenda}}&lt;br /&gt;
&amp;lt;!-- --------------------------------------------------------------------&lt;br /&gt;
INSTRUCTIONS FOR EDITORS:&lt;br /&gt;
&lt;br /&gt;
Updating this agenda is a 3-step process. First you must convert the existing entries to the&lt;br /&gt;
new format. You can do these one at a time or all at once. Whatever is easiest. Second, you need to&lt;br /&gt;
fill in the data for the presentation. Third, miscellaneous details should be cleaned up.&lt;br /&gt;
&lt;br /&gt;
1) To convert a presentation to the new format:&lt;br /&gt;
  - Most importantly, look at the 10:00 time slot and use it as an example.&lt;br /&gt;
  - Find the time slot you want to modify.&lt;br /&gt;
  - If it already has the Presentation Agenda Template then you are done&lt;br /&gt;
  - Copy: {{2010_BASC:Presentaton_Agenda_Template|TYPE|To Be Determined Presentation|To Be Determined}}&lt;br /&gt;
  - Delete the text that is in the time slot already. This requires great care.&lt;br /&gt;
      You probably want to delete the lines that do not begin with a &lt;br /&gt;
      pipe (|) or an open curly ({).&lt;br /&gt;
  - Paste the text you copied into that time slot.&lt;br /&gt;
  - Replace the word &amp;quot;TYPE&amp;quot; with either &amp;quot;Presentation&amp;quot; or &amp;quot;Keynote&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2) To fill in the appropriate data:&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Presentations and add&lt;br /&gt;
    the presentation's abstract. If you don't have an abstract,&lt;br /&gt;
    insert &amp;quot;Presentation abstract will be available shortly.&amp;quot;&lt;br /&gt;
  - Go to http://www.owasp.org/index.php/2010_BASC_Speakers and add the speaker(s) bio.&lt;br /&gt;
    If you don't have bio information, just put the speaker's name into the page and &lt;br /&gt;
    and make their bio &amp;quot;Speaker information will be available shortly.&amp;quot;&lt;br /&gt;
    Until it presents a problem, list multiple speakers as one.&lt;br /&gt;
    For example, &amp;quot;John Boy &amp;amp; Grandpa&amp;quot;.&lt;br /&gt;
  - Find the right slot in the table.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined Presentation&amp;quot; text in the table&lt;br /&gt;
    with the presentation name __EXACTLY__ as it is on the presentation page.&lt;br /&gt;
  - Replace the &amp;quot;To Be Determined&amp;quot; text in the table&lt;br /&gt;
    with the speaker(s) name(s) __EXACTLY__ as it is on the bio page.&lt;br /&gt;
  &lt;br /&gt;
3) Clean up whatever needs cleaning up.&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------------------------- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__FORCETOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Presentations&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 27, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 8:30-9:30 &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:80%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Breakfast and Registration'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://www.blackducksoftware.com/ Black Duck Software]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;  --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 09:00-09:50 &lt;br /&gt;
| colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:80%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Opening Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Secure By Design]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Wysopal]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; rowspan=&amp;quot;12&amp;quot; style=&amp;quot;width:10%; margin:10px; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 1px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''Capture the Flag&amp;lt;br/&amp;gt;Arena'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Vic Solem &amp;amp;amp;&amp;lt;br/&amp;gt;Phil Barrows'''&amp;lt;br/&amp;gt;MEI Security&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;DEFENDERS&amp;lt;br/&amp;gt;Jay Peak Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;ATTACKERS&amp;lt;br/&amp;gt;Bretton Woods Room&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;Command &amp;amp;amp; Control&amp;lt;br/&amp;gt;Cranmore Room&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | || align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Washington/Jefferson Room'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Adams Room'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Painless Threat Modeling|Andrew Gronosky }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|From Tears to Tiers; using DAST and Tiering to Make Pentesting Great Again|Joshua Piotrowski &amp;amp;amp; Jessica Boy }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|MSeVader: Outsmarting the WAF|Brent Dukes }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Website Security – AppSec’s partial solution to a complex problem|Chris Olson }}&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Lunch'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[https://ll.mit.edu/ MIT Lincoln Laboratory]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|A How Not to Fail Your DevSecOps Transformation|Eitan Worcel }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Navigating the Bug Bounty Marketplace|Bryan Brannigan }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|API Security Challenges|Angelo Castigliola }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Voyages of the Security-Driven Enterprise|Katie Knowles }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Modern Security Architecture with OpenID Connect|Brock Allen  }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Introduction to Android Security|Dzung Pham }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|Acquiring and Retaining Cybersecurity Talent: A Proven Model|Deidre Diamond }}&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Presentation|It depends on....|Tania Ward &amp;amp;amp; Kristen Pascale }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 17:00-17:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width: 1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Social Time'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
provided by our Platinum Sponsor&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;span style=&amp;quot;font-size:140%&amp;quot;&amp;gt;'''[http://veracode.com Veracode]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt; --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 1px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 17:30-18:30&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Closing Keynote'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 150%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Security at the Intersection of Software, Biology, and Science Fiction]]'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''[[2018_BASC_Homepage#Keynotes|Chris Poulin]]'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Raffle'''&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:130%&amp;quot;&amp;gt;'''Wrap Up'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- lighter blue: #9BA8CF --&amp;gt;&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
= Workshops =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;  |&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
[[File:OWASP Logo.gif]]&amp;lt;br/&amp;gt; &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size:150%&amp;quot;&amp;gt;'''Workshops&amp;lt;br/&amp;gt;OWASP Boston Application Security Conference · Saturday, October 14, 2018'''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Attitash'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Monroe'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cannon'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Bretton Woods'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Jay Peak'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; | '''Cranmore'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 10:00-10:50 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|AppSec Wars Challenge|Steve Allor }}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 11:00-11:50&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color:#D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 12:00-12:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Workshop_Agenda_Template|Presentation|Jackbox Games|Matt Morency }}&lt;br /&gt;
| style=&amp;quot;width:10%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; |   &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 13:00-13:50&lt;br /&gt;
| rowspan=&amp;quot;4&amp;quot; style=&amp;quot;width:30%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Threat Modeling Workshop|Robert Hurlbut  }}&lt;br /&gt;
| rowspan=&amp;quot;3&amp;quot; style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Presentaton_Agenda_Template|Workshop|Pen Testing Android Applications Workshop|Roshan Thomas &amp;amp;amp; Abhishek Singh }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 14:00-14:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | {{2018_BASC:Resume_Agenda_Template|CyberSN / brainbabe }}&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 0px&amp;quot; align=&amp;quot;center&amp;quot; | 15:00-15:50&lt;br /&gt;
| rowspan=&amp;quot;2&amp;quot; style=&amp;quot;width:30%; background:#FFFBDF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#FFFFFF; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | 16:00-16:50&lt;br /&gt;
| style=&amp;quot;width:30%; background:#F8F8ED; border-style: solid; border-color: #D2D2D2; border-top-width:1px; border-right-width: 0px; border-left-width: 0px; border-bottom-width: 1px&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Agenda}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Resume_Room&amp;diff=244359</id>
		<title>2018 BASC Resume Room</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Resume_Room&amp;diff=244359"/>
				<updated>2018-10-18T14:55:41Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: resume room&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2017_BASC:Header_Template | Resume Room}}&lt;br /&gt;
&lt;br /&gt;
=== Resume Room ===&lt;br /&gt;
&lt;br /&gt;
'''BASC's 4th year'''&lt;br /&gt;
&lt;br /&gt;
''Pre-requisite:'' Hard-copy resume for markups or “electronic, but bring paper”&lt;br /&gt;
&lt;br /&gt;
Looking to switch careers or need a resume makeover? Come to this room to have security practitioners review your resume and give you honest feedback. Learn some new strategies along the way to use them. Bring your questions and get answers!&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Adrianna Iadorola, CyberSN&amp;lt;br/&amp;gt;&lt;br /&gt;
Jennifer Stitt, MIT Lincoln Laboratory&amp;lt;br/&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attitash&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2017_BASC:Footer_Template | Resume Room}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Resume_Agenda_Template&amp;diff=244357</id>
		<title>Template:2018 BASC:Resume Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Resume_Agenda_Template&amp;diff=244357"/>
				<updated>2018-10-18T14:53:05Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: resume template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Resume_Room|Resume Room]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;{{{1}}}&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Workshop_Agenda_Template&amp;diff=244356</id>
		<title>Template:2018 BASC:Workshop Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Workshop_Agenda_Template&amp;diff=244356"/>
				<updated>2018-10-18T14:52:04Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: workshop template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Workshops#{{{2}}}|{{{2}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#{{{3}}}|{{{3}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Agenda_Template&amp;diff=244355</id>
		<title>Template:2018 BASC:Presentaton Agenda Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Presentaton_Agenda_Template&amp;diff=244355"/>
				<updated>2018-10-18T14:50:30Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: agenda template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- &lt;br /&gt;
   Parameters:&lt;br /&gt;
      1=Caption. For example, &amp;quot;Presentation&amp;quot;, or &amp;quot;Breakfast&amp;quot;&lt;br /&gt;
      2=Presentation Name __EXACTLY__ as it appears on the presentation page&lt;br /&gt;
      3=Presentation Speaker __EXACTLY__ as it appears on the speaker page&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;div style=&amp;quot;margin:0px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 120%&amp;quot;&amp;gt;[[2018_BASC_Presentations#{{{2}}}|{{{2}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-size: 110%&amp;quot;&amp;gt;[[2018_BASC_Speakers#{{{3}}}|{{{3}}}]]&amp;lt;/span&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:2018_BASC&amp;diff=244054</id>
		<title>Category:2018 BASC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:2018_BASC&amp;diff=244054"/>
				<updated>2018-10-06T13:39:15Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: 2018 BASC category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Homepage/COC&amp;diff=244053</id>
		<title>2018 BASC Homepage/COC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Homepage/COC&amp;diff=244053"/>
				<updated>2018-10-06T13:38:36Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: footer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Code of Conduct}}&lt;br /&gt;
&lt;br /&gt;
The Boston Application Security Conference (BASC) provides a forum for open discussion between participants, where radical viewpoints are welcome and a high degree of skepticism is expected. However, insulting or harassing other participants is unacceptable. We want BASC to be a safe and productive environment for everyone. It’s not about what you look like but what’s in your mind and how you present yourself that counts at BASC.&lt;br /&gt;
&lt;br /&gt;
We do not condone any form of harassment against any participant, for any reason. Harassment includes, but is not limited to, deliberate intimidation and targeting individuals in a manner that makes them feel uncomfortable, unwelcome, or afraid.&lt;br /&gt;
&lt;br /&gt;
Participants asked to stop any harassing behavior are expected to comply immediately. We reserve the right to respond to harassment in the manner we deem appropriate, including but not limited to expulsion without refund and referral to the relevant authorities.&lt;br /&gt;
&lt;br /&gt;
This Code of Conduct applies to everyone participating at BASC – from attendees and exhibitors to speakers, press, volunteers, and staff.&lt;br /&gt;
&lt;br /&gt;
Anyone can report harassment. If you are being harassed, notice that someone else is being harassed, or have any other concerns, you can contact a staff member, go to the registration desk, or information booth.&lt;br /&gt;
&lt;br /&gt;
You can email an actively monitored mailbox (during the conference timeframes) at the email address:&lt;br /&gt;
&lt;br /&gt;
boston [at] owasp.org&lt;br /&gt;
&lt;br /&gt;
This is if you do not feel comfortable speaking to someone in person. For immediate response, we recommend notifying a staff member in-person. Note that if this is an emergency, please dial 911 and contact law enforcement immediately.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Conference staff will be happy to help participants contact hotel security, local law enforcement, or otherwise assist those experiencing harassment to feel safe for the duration of BASC.&lt;br /&gt;
&lt;br /&gt;
Remember: The conference is what you make of it, and as a community we can create a great experience for everyone. Our goal at BASC is to have a resonating impact on the information security industry and as a conference. Thank you to all who make BAC a success and for the continued awesomeness of the community.&lt;br /&gt;
&lt;br /&gt;
-Boston Application Security Conference Team&lt;br /&gt;
 (Thank you DEFCON for letting us use your opensource COC!)&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template|Code of Conduct}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Homepage/COC&amp;diff=244052</id>
		<title>2018 BASC Homepage/COC</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Homepage/COC&amp;diff=244052"/>
				<updated>2018-10-06T13:37:15Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: header&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Code of Conduct}}&lt;br /&gt;
&lt;br /&gt;
The Boston Application Security Conference (BASC) provides a forum for open discussion between participants, where radical viewpoints are welcome and a high degree of skepticism is expected. However, insulting or harassing other participants is unacceptable. We want BASC to be a safe and productive environment for everyone. It’s not about what you look like but what’s in your mind and how you present yourself that counts at BASC.&lt;br /&gt;
&lt;br /&gt;
We do not condone any form of harassment against any participant, for any reason. Harassment includes, but is not limited to, deliberate intimidation and targeting individuals in a manner that makes them feel uncomfortable, unwelcome, or afraid.&lt;br /&gt;
&lt;br /&gt;
Participants asked to stop any harassing behavior are expected to comply immediately. We reserve the right to respond to harassment in the manner we deem appropriate, including but not limited to expulsion without refund and referral to the relevant authorities.&lt;br /&gt;
&lt;br /&gt;
This Code of Conduct applies to everyone participating at BASC – from attendees and exhibitors to speakers, press, volunteers, and staff.&lt;br /&gt;
&lt;br /&gt;
Anyone can report harassment. If you are being harassed, notice that someone else is being harassed, or have any other concerns, you can contact a staff member, go to the registration desk, or information booth.&lt;br /&gt;
&lt;br /&gt;
You can email an actively monitored mailbox (during the conference timeframes) at the email address:&lt;br /&gt;
&lt;br /&gt;
boston [at] owasp.org&lt;br /&gt;
&lt;br /&gt;
This is if you do not feel comfortable speaking to someone in person. For immediate response, we recommend notifying a staff member in-person. Note that if this is an emergency, please dial 911 and contact law enforcement immediately.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Conference staff will be happy to help participants contact hotel security, local law enforcement, or otherwise assist those experiencing harassment to feel safe for the duration of BASC.&lt;br /&gt;
&lt;br /&gt;
Remember: The conference is what you make of it, and as a community we can create a great experience for everyone. Our goal at BASC is to have a resonating impact on the information security industry and as a conference. Thank you to all who make BAC a success and for the continued awesomeness of the community.&lt;br /&gt;
&lt;br /&gt;
-Boston Application Security Conference Team&lt;br /&gt;
 (Thank you DEFCON for letting us use your opensource COC!)&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244051</id>
		<title>Template:2018 BASC:Header Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=244051"/>
				<updated>2018-10-06T13:36:04Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: add talks workshops and speakers to header nav bar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:Boston-Banner-468x60.gif|702x90px]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[2018 BASC Homepage|Home]] | &amp;lt;!-- [[2018 BASC Agenda|Agenda]] | [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] | --&amp;gt; [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit]  |  [https://www.owasp.org/index.php/2018_BASC_Homepage/COC Code of Conduct] | [[2018 BASC Presentations|Presentations]] | [[2018 BASC Workshops|Workshops]] | [[2018 BASC Speakers|Speakers]]  | &amp;lt;!-- [URL_TBD Register] | --&amp;gt;[[Image:twitter_32.png|link=https://twitter.com/@BASConf]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Sponsor_Bar_Template}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Blackduck-synopsys-299x91.png&amp;diff=244050</id>
		<title>File:Blackduck-synopsys-299x91.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Blackduck-synopsys-299x91.png&amp;diff=244050"/>
				<updated>2018-10-06T13:25:39Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Sponsor_Bar_Template&amp;diff=244049</id>
		<title>Template:2018 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Sponsor_Bar_Template&amp;diff=244049"/>
				<updated>2018-10-06T13:25:11Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:0px solid #EEEEEE; text-align: center&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 55%; align: center&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold&amp;quot;&amp;gt;Platinum Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 80px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:HackerOne_Logo_.jpg|link=https://www.hackerone.com/|170x50px|HackerOne]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:blackduck-synopsys-299x91.png|link=https://www.blackducksoftware.com/|299x91px|Black Duck Software]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
           &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:CA_vanguard_417x124.png|link=http://www.veracode.com/|417x124px|Veracode]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 25%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;&amp;lt;br/&amp;gt;Gold Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Checkmarx_new.png|link=https://checkmarx.com|270x57px|Checkmarx]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:TCell_V_GRD_CLR_RGB-800-160x128.png|link=https://www.tcell.io/|160x128px|tCell.io]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
            [[File:AccuvantA10.png|link=https://www.accuvant.com/|170x78px|Accuvant]]&lt;br /&gt;
            &amp;amp;emsp;[[File:LOGOcontrast299x97.gif|link=http://contrastsecurity.com|299x97px|Contrast Security]]&lt;br /&gt;
            &amp;amp;emsp;&amp;amp;emsp;[[File:NetSPI Logo offset.jpg|link=http://netspi.com|180x90px|NetSPI]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
            [[File:Qualys-full-color-horizontal-tagline-rgb-243x77.png|link=http://www.qualys.com/|243x77px|Qualys]]&lt;br /&gt;
            [[File:Nvisium-full_color-on_light_bg.png|link=https://nvisium.com|234x102px|nVisium]]&lt;br /&gt;
		&amp;lt;/p&amp;gt;&lt;br /&gt;
		&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;display: inline; width: 15%&amp;quot;&amp;gt;&lt;br /&gt;
        &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold; display: inline-block&amp;quot;&amp;gt;Silver Sponsors&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&amp;amp;nbsp;&amp;lt;/p&amp;gt;&lt;br /&gt;
        &amp;lt;p style=&amp;quot;line-height: 10px; padding-left: 30px; padding-right: 30px;&amp;quot;&amp;gt;&lt;br /&gt;
           &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:AuricLogo_160.png|link=http://www.auricsystems.com//|160x71px|Auric]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
            &amp;lt;span style=&amp;quot;padding: 20px&amp;quot;&amp;gt;[[File:Bugcrowd.jpg|link=http://www.bugcrowd.com/|248x49px|bugcrowd]]&amp;lt;/span&amp;gt;&lt;br /&gt;
            [[File:Stormpath-blue-logo-218x52.png|link=https://www.stormpath.com/|218x52px|Stormpath]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Facebook.PNG|link=http://www.facebook.com|206x62px|Facebook]]&lt;br /&gt;
            &amp;amp;emsp;[[File:Synopsys L|link=http://www.synopsys.com/home.aspx|150x45px|Synopsys]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
        &amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div&amp;gt;&lt;br /&gt;
	&amp;lt;p&amp;gt;&amp;lt;br/&amp;gt;Silver Sponsorships are available: See [[Media:BASCSponsorship2018.pdf|Sponsorship Kit]]&amp;lt;br/&amp;gt;&lt;br /&gt;
            Please help us keep BASC free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
	&amp;lt;/p&amp;gt;&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242141</id>
		<title>BASC 2018 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242141"/>
				<updated>2018-07-27T16:23:13Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: /* Submit Your Proposal */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference 2018 on October 27, 2018. This our eighth annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Future / Advanced / New Research in Application security.&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston@owasp.org boston@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242140</id>
		<title>BASC 2018 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242140"/>
				<updated>2018-07-27T16:22:48Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference 2018 on October 27, 2018. This our eighth annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Future / Advanced / New Research in Application security.&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston@owasp.org boston@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Homepage&amp;diff=241562</id>
		<title>2018 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Homepage&amp;diff=241562"/>
				<updated>2018-06-29T16:59:43Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2018 Boston Application Security Conference (BASC). *Note that the conference will be free but training and workshops may incur a fee*.  Conference will take place 8:30am to 6:30pm on Saturday, October 27&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[TBD TBD]  &lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
* [https://www.eventbrite.com/o/owasp-boston-591242931 Registration]&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''TITLE PLACEHOLDER'''&lt;br /&gt;
&lt;br /&gt;
'''NAME''' Company&lt;br /&gt;
&lt;br /&gt;
[[File:TBD.png|left|thumb]]&lt;br /&gt;
PLACEHOLDER&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018 BASC:Section Template | The Details}}&lt;br /&gt;
* [[2018_BASC_Agenda | Agenda]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[2018_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2018_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2018_BASC_Speakers | Speakers]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* LinkedIn [https://www.linkedin.com/groups/Boston-Application-Security-Conference-BASC-4631647 Group]&lt;br /&gt;
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2018&lt;br /&gt;
* [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit]&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2018_BASC_Homepage&amp;diff=241561</id>
		<title>2018 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2018_BASC_Homepage&amp;diff=241561"/>
				<updated>2018-06-29T16:59:28Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
== Welcome   ==&lt;br /&gt;
This is the homepage for the 2018 Boston Application Security Conference (BASC). *Note that the conference will be free but training and workshops may incur a fee*.  Conference will take place 8:30am to 6:30pm on Saturday, October 27&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at &lt;br /&gt;
* Location: [https://goo.gl/maps/MErChZ3cX5B2 5 Wayside Road Burlington, MA]  &lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Keynote Speaker ==&lt;br /&gt;
&lt;br /&gt;
Chris Wysopal &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
[TBD TBD]  &lt;br /&gt;
&lt;br /&gt;
Registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited.&lt;br /&gt;
* [https://www.eventbrite.com/o/owasp-boston-591242931 Registration]&lt;br /&gt;
&lt;br /&gt;
== Keynotes ==&lt;br /&gt;
&lt;br /&gt;
'''TITLE PLACEHOLDER'''&lt;br /&gt;
&lt;br /&gt;
'''NAME''' Company&lt;br /&gt;
&lt;br /&gt;
[[File:TBD.png|left|thumb]]&lt;br /&gt;
PLACEHOLDER&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018 BASC:Section Template | The Details}}&lt;br /&gt;
* [[2018_BASC_Agenda | Agenda]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
* [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
* [[2018_BASC_Presentations | Presentations]]&lt;br /&gt;
* [[2018_BASC_Workshops | Workshops]]&lt;br /&gt;
* [[2018_BASC_Speakers | Speakers]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* LinkedIn [https://www.linkedin.com/groups/Boston-Application-Security-Conference-BASC-4631647 Group]&lt;br /&gt;
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2018&lt;br /&gt;
* [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit]&lt;br /&gt;
&lt;br /&gt;
== OWASP Boston Chapter ==&lt;br /&gt;
BASC is presented by the [https://www.owasp.org/index.php/Boston OWASP Boston] chapter. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=241560</id>
		<title>BASC 2018 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=241560"/>
				<updated>2018-06-29T16:49:40Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference 2017 on October 27, 2017. This our eigth annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Future / Advanced / New Research in Application security.&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston@owasp.org boston@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=241559</id>
		<title>BASC 2018 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=241559"/>
				<updated>2018-06-29T16:46:56Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference 2017 on October 27, 2017. This our eigth annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Future / Advanced / New Research in Application security.&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston@owasp.org boston@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=241558</id>
		<title>Template:2018 BASC:Header Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2018_BASC:Header_Template&amp;diff=241558"/>
				<updated>2018-06-29T16:21:32Z</updated>
		
		<summary type="html">&lt;p&gt;Tom Conner: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[[File:Boston-Banner-468x60.gif|702x90px]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[[2018 BASC Homepage|Home]] | &amp;lt;!-- [[2018 BASC Agenda|Agenda]] | --&amp;gt; [[BASC 2018 Call For Papers|Call for Presentations and Workshops]] | [https://www.owasp.org/index.php/File:BASCSponsorship2018_v2_(002).docx Sponsorship Kit] &amp;lt;!-- [[2018 BASC Presentations|Presentations]] | [[2018 BASC Workshops|Workshops]] | [[2018 BASC Speakers|Speakers]]  | [URL_TBD Register] | --&amp;gt;[[Image:twitter_32.png|link=https://twitter.com/@BASConf]]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Sponsor_Bar_Template}}&lt;/div&gt;</summary>
		<author><name>Tom Conner</name></author>	</entry>

	</feed>