<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Versprite</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Versprite"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Versprite"/>
		<updated>2026-05-04T04:51:03Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=247702</id>
		<title>OWASP Risk Rating Methodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=247702"/>
				<updated>2019-02-21T07:29:41Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==The OWASP Risk Rating Methodology== &lt;br /&gt;
&lt;br /&gt;
Discovering vulnerabilities is important, but being able to estimate the associated risk to the business is just as important. Early in the life cycle, one may identify security concerns in the architecture or design by using [[threat modeling]].  Later, one may find security issues using [[code review]] or [[penetration testing]].  Or problems may not be discovered until the application is in production and is actually compromised.&lt;br /&gt;
&lt;br /&gt;
By following the approach here, it is possible to estimate the severity of all of these risks to the business and make an informed decision about what to do about those risks. Having a system in place for rating risks will save time and eliminate arguing about priorities. This system will help to ensure that the business doesn't get distracted by minor risks while ignoring more serious risks that are less well understood.&lt;br /&gt;
&lt;br /&gt;
Ideally there would be a universal risk rating system that would accurately estimate all risks for all organizations. But a vulnerability that is critical to one organization may not be very important to another. So a basic framework is presented here that should be ''customized'' for the particular organization.&lt;br /&gt;
&lt;br /&gt;
The authors have tried hard to make this model simple to use, while keeping enough detail for accurate risk estimates to be made. Please reference the section below on customization for more information about tailoring the model for use in a specific organization.&lt;br /&gt;
&lt;br /&gt;
==Approach==&lt;br /&gt;
&lt;br /&gt;
There are many different approaches to risk analysis. See the reference section below for some of the most common ones. The OWASP approach presented here is based on these standard methodologies and is customized for application security.&lt;br /&gt;
&lt;br /&gt;
Let's start with the standard risk model:&lt;br /&gt;
&lt;br /&gt;
       '''Risk = Likelihood * Impact'''&lt;br /&gt;
&lt;br /&gt;
In the sections below the factors that make up &amp;quot;likelihood&amp;quot; and &amp;quot;impact&amp;quot; for application security are broken down. The tester is shown how to combine them to determine the overall severity for the risk.&lt;br /&gt;
&lt;br /&gt;
* [[#Step 1: Identifying a Risk]]&lt;br /&gt;
* [[#Step 2: Factors for Estimating Likelihood]]&lt;br /&gt;
* [[#Step 3: Factors for Estimating Impact]]&lt;br /&gt;
* [[#Step 4: Determining Severity of the Risk]]&lt;br /&gt;
* [[#Step 5: Deciding What to Fix]]&lt;br /&gt;
* [[#Step 6: Customizing Your Risk Rating Model]]&lt;br /&gt;
&lt;br /&gt;
==Step 1: Identifying a Risk==&lt;br /&gt;
&lt;br /&gt;
The first step is to identify a security risk that needs to be rated. The tester needs to gather information about the [[threat agent]] involved, the [[attack]] that will be used, the [[vulnerability]] involved, and the [[impact]] of a successful exploit on the business. There may be multiple possible groups of attackers, or even multiple possible business impacts.  In general, it's best to err on the side of caution by using the worst-case option, as that will result in the highest overall risk.&lt;br /&gt;
&lt;br /&gt;
==Step 2: Factors for Estimating Likelihood==&lt;br /&gt;
&lt;br /&gt;
Once the tester has identified a potential risk and wants to figure out how serious it is, the first step is to estimate the &amp;quot;likelihood&amp;quot;. At the highest level, this is a rough measure of how likely this particular vulnerability is to be uncovered and exploited by an attacker. It is not necessary to be over-precise in this estimate. Generally, identifying whether the likelihood is low, medium, or high is sufficient.&lt;br /&gt;
&lt;br /&gt;
There are a number of factors that can help determine the likelihood. The first set of factors are related to the [[threat agent]] involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers. Note that there may be multiple threat agents that can exploit a particular vulnerability, so it's usually best to use the worst-case scenario. For example, an insider may be a much more likely attacker than an anonymous outsider, but it depends on a number of factors.&lt;br /&gt;
&lt;br /&gt;
Note that each factor has a set of options, and each option has a likelihood rating from 0 to 9 associated with it. These numbers will be used later to estimate the overall likelihood.&lt;br /&gt;
&lt;br /&gt;
===[[Threat Agent]] Factors===&lt;br /&gt;
&lt;br /&gt;
The first set of factors are related to the [[threat agent]] involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.&lt;br /&gt;
&lt;br /&gt;
; Skill level&lt;br /&gt;
: How technically skilled is this group of threat agents? No technical skills (1), some technical skills (3), advanced computer user (5), network and programming skills (6), security penetration skills (9), &lt;br /&gt;
&lt;br /&gt;
; Motive&lt;br /&gt;
: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9)&lt;br /&gt;
&lt;br /&gt;
; Opportunity&lt;br /&gt;
: What resources and opportunities are required for this group of threat agents to find and exploit this vulnerability? Full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9)&lt;br /&gt;
&lt;br /&gt;
; Size&lt;br /&gt;
: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)&lt;br /&gt;
&lt;br /&gt;
===[[Vulnerability]] Factors===&lt;br /&gt;
&lt;br /&gt;
The next set of factors are related to the [[vulnerability]] involved. The goal here is to estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above.&lt;br /&gt;
&lt;br /&gt;
; Ease of discovery&lt;br /&gt;
: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Ease of exploit&lt;br /&gt;
: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Awareness&lt;br /&gt;
: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9)&lt;br /&gt;
&lt;br /&gt;
; Intrusion detection&lt;br /&gt;
: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)&lt;br /&gt;
&lt;br /&gt;
==Step 3: Factors for Estimating Impact==&lt;br /&gt;
&lt;br /&gt;
When considering the impact of a successful attack, it's important to realize that there are two kinds of impacts. The first is the &amp;quot;technical impact&amp;quot; on the application, the data it uses, and the functions it provides.  The other is the &amp;quot;business impact&amp;quot; on the business and company operating the application.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the business impact is more important. However, you may not have access to all the information required to figure out the business consequences of a successful exploit. In this case, providing as much detail about the technical risk will enable the appropriate business representative to make a decision about the business risk.&lt;br /&gt;
&lt;br /&gt;
Again, each factor has a set of options, and each option has an impact rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall impact.&lt;br /&gt;
&lt;br /&gt;
===Technical Impact Factors===&lt;br /&gt;
&lt;br /&gt;
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.&lt;br /&gt;
&lt;br /&gt;
; Loss of confidentiality&lt;br /&gt;
: How much data could be disclosed and how sensitive is it? Minimal non-sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of integrity&lt;br /&gt;
: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of availability&lt;br /&gt;
: How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of accountability&lt;br /&gt;
: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)&lt;br /&gt;
&lt;br /&gt;
===Business Impact Factors===&lt;br /&gt;
&lt;br /&gt;
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.&lt;br /&gt;
&lt;br /&gt;
Many companies have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help you focus on what's truly important for security. If these aren't available, then it is necessary to talk with people who understand the business to get their take on what's important.&lt;br /&gt;
&lt;br /&gt;
The factors below are common areas for many businesses, but this area is even more unique to a company than the factors related to threat agent, vulnerability, and technical impact.&lt;br /&gt;
&lt;br /&gt;
; Financial damage&lt;br /&gt;
: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)&lt;br /&gt;
&lt;br /&gt;
; Reputation damage&lt;br /&gt;
: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)&lt;br /&gt;
&lt;br /&gt;
; Non-compliance&lt;br /&gt;
: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7)&lt;br /&gt;
&lt;br /&gt;
; Privacy violation&lt;br /&gt;
: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)&lt;br /&gt;
&lt;br /&gt;
==Step 4: Determining the Severity of the Risk== &lt;br /&gt;
&lt;br /&gt;
In this step the likelihood estimate and the impact estimate are put together to calculate an overall severity for this risk.  This is done by figuring out whether the likelihood is low, medium, or high and then do the same for impact. The 0 to 9 scale is split into three parts:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;40%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Likelihood and Impact Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;0 to &amp;amp;lt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3 to &amp;amp;lt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6 to 9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Informal Method===&lt;br /&gt;
&lt;br /&gt;
In many environments, there is nothing wrong with reviewing the factors and simply capturing the answers. The tester should think through the factors and identify the key &amp;quot;driving&amp;quot; factors that are controlling the result. The tester may discover that their initial impression was wrong by considering aspects of the risk that weren't obvious.&lt;br /&gt;
&lt;br /&gt;
===Repeatable Method===&lt;br /&gt;
&lt;br /&gt;
If it is necessary to defend the ratings or make them repeatable, then it is necessary to go through a more formal process of rating the factors and calculating the result. Remember that there is quite a lot of uncertainty in these estimates and that these factors are intended to help the tester arrive at a sensible result. This process can be supported by automated tools to make the calculation easier. &lt;br /&gt;
&lt;br /&gt;
The first step is to select one of the options associated with each factor and enter the associated number in the table. Then simply take the average of the scores to calculate the overall likelihood. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;'''Threat agent factors'''&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;'''Vulnerability factors'''&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Skill level&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Motive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Opportunity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Size&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;2%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Ease of discovery&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Ease of exploit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Awareness&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Intrusion detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;9&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall likelihood=4.375 (MEDIUM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the tester needs to figure out the overall impact. The process is similar here. In many cases the answer will be obvious, but the tester can make an estimate based on the factors, or they can average the scores for each of the factors. Again, less than 3 is low, 3 to less than 6 is medium, and 6 to 9 is high.  For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Technical Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Business Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of confidentiality&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of accountability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;2%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Financial damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Reputation damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Non-compliance&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Privacy violation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall technical impact=7.25 (HIGH)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall business impact=2.25 (LOW)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Determining Severity===&lt;br /&gt;
&lt;br /&gt;
However the tester arrives at the likelihood and impact estimates, they can now combine them to get a final severity rating for this risk. Note that if they have good business impact information, they should use that instead of the technical impact information.  But if they have no information about the business, then technical impact is the next best thing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall Risk Severity&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th rowspan=&amp;quot;4&amp;quot; width=&amp;quot;15%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;pink&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Critical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;lightgreen&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Note&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Likelihood&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the example above, the likelihood is medium and the technical impact is high, so from a purely technical perspective it appears that the overall severity is high.  However, note that the business impact is actually low, so the overall severity is best described as low as well. This is why understanding the business context of the vulnerabilities you are evaluating is so critical to making good risk decisions. Failure to understand this context can lead to the lack of trust between the business and security teams that is present in many organizations.&lt;br /&gt;
&lt;br /&gt;
==Step 5: Deciding What to Fix==&lt;br /&gt;
&lt;br /&gt;
After the risks to the application have been classified there will be a prioritized list of what to fix. As a general rule, the most severe risks should be fixed first. It simply doesn't help the overall risk profile to fix less important risks, even if they're easy or cheap to fix.&lt;br /&gt;
&lt;br /&gt;
Remember that not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue. For example, if it would cost $100,000 to implement controls to stem $2,000 of fraud per year, it would take 50 years return on investment to stamp out the loss. But remember there may be reputation damage from the fraud that could cost the organization much more.&lt;br /&gt;
&lt;br /&gt;
==Step 6: Customizing the Risk Rating Model==&lt;br /&gt;
&lt;br /&gt;
Having a risk ranking framework that is customizable for a business is critical for adoption.  A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk. A lot of time can be wasted arguing about the risk ratings if they are not supported by a model like this. There are several ways to tailor this model for the organization.&lt;br /&gt;
&lt;br /&gt;
===Adding factors===&lt;br /&gt;
&lt;br /&gt;
The tester can choose different factors that better represent what's important for the specific organization. For example, a military application might add impact factors related to loss of human life or classified information. The tester might also add likelihood factors, such as the window of opportunity for an attacker or encryption algorithm strength.&lt;br /&gt;
&lt;br /&gt;
===Customizing options===&lt;br /&gt;
&lt;br /&gt;
There are some sample options associated with each factor, but the model will be much more effective if the tester customizes these options to the business. For example, use the names of the different teams and the company names for different classifications of information. The tester can also change the scores associated with the options. The best way to identify the right scores is to compare the ratings produced by the model with ratings produced by a team of experts. You can tune the model by carefully adjusting the scores to match.&lt;br /&gt;
&lt;br /&gt;
===Weighting factors===&lt;br /&gt;
&lt;br /&gt;
The model above assumes that all the factors are equally important. You can weight the factors to emphasize the factors that are more significant for the specific business. This makes the model a bit more complex, as the tester needs to use a weighted average. But otherwise everything works the same. Again it is possible to tune the model by matching it against risk ratings the business agrees are accurate.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* Risk Centric Threat Modeling using Process for Attack Simulation &amp;amp; Threat Analysis (PASTA) [https://www.wiley.com/en-us/Risk+Centric+Threat+Modeling%3A+Process+for+Attack+Simulation+and+Threat+Analysis-p-9781118988350][https://versprite.com/tag/pasta-threat-modeling/] &lt;br /&gt;
* Managing Information Security Risk: Organization, Mission, and Information System View [http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf]&lt;br /&gt;
* Industry standard vulnerability severity and risk rankings (CVSS) [http://www.first.org/cvss/]&lt;br /&gt;
* Security-enhancing process models (CLASP) [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project]&lt;br /&gt;
* Cheat Sheet: Web Application Security Frame - MSDN - Microsoft [http://msdn.microsoft.com/en-us/library/ff649461.aspx]&lt;br /&gt;
* [[Threat_Risk_Modeling|Threat Risk Modeling]]&lt;br /&gt;
* Pratical Threat Analysis [http://www.ptatechnologies.com/]&lt;br /&gt;
* Application Security Risk Assessment Guidelines [http://kb.wisc.edu/page.php?id=20262]&lt;br /&gt;
* A Platform for Risk Analysis of Security Critical Systems [http://sourceforge.net/projects/coras/]&lt;br /&gt;
* Model-driven Development and Analysis of Secure Information Systems [http://heim.ifi.uio.no/~ketils/securis/]&lt;br /&gt;
* Value Driven Security Threat Modeling Based on Attack Path Analysis [http://origin-www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550280a.pdf]&lt;br /&gt;
* [[:File:OWASP_Risk_Rating_Template_Example.xlsx|Risk Rating Template Example in MS Excel]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=247701</id>
		<title>OWASP Risk Rating Methodology</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Risk_Rating_Methodology&amp;diff=247701"/>
				<updated>2019-02-21T07:25:47Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v4}}&lt;br /&gt;
&lt;br /&gt;
==The OWASP Risk Rating Methodology== &lt;br /&gt;
&lt;br /&gt;
Discovering vulnerabilities is important, but being able to estimate the associated risk to the business is just as important. Early in the life cycle, one may identify security concerns in the architecture or design by using [[threat modeling]].  Later, one may find security issues using [[code review]] or [[penetration testing]].  Or problems may not be discovered until the application is in production and is actually compromised.&lt;br /&gt;
&lt;br /&gt;
By following the approach here, it is possible to estimate the severity of all of these risks to the business and make an informed decision about what to do about those risks. Having a system in place for rating risks will save time and eliminate arguing about priorities. This system will help to ensure that the business doesn't get distracted by minor risks while ignoring more serious risks that are less well understood.&lt;br /&gt;
&lt;br /&gt;
Ideally there would be a universal risk rating system that would accurately estimate all risks for all organizations. But a vulnerability that is critical to one organization may not be very important to another. So a basic framework is presented here that should be ''customized'' for the particular organization.&lt;br /&gt;
&lt;br /&gt;
The authors have tried hard to make this model simple to use, while keeping enough detail for accurate risk estimates to be made. Please reference the section below on customization for more information about tailoring the model for use in a specific organization.&lt;br /&gt;
&lt;br /&gt;
==Approach==&lt;br /&gt;
&lt;br /&gt;
There are many different approaches to risk analysis. See the reference section below for some of the most common ones. The OWASP approach presented here is based on these standard methodologies and is customized for application security.&lt;br /&gt;
&lt;br /&gt;
Let's start with the standard risk model:&lt;br /&gt;
&lt;br /&gt;
       '''Risk = Likelihood * Impact'''&lt;br /&gt;
&lt;br /&gt;
In the sections below the factors that make up &amp;quot;likelihood&amp;quot; and &amp;quot;impact&amp;quot; for application security are broken down. The tester is shown how to combine them to determine the overall severity for the risk.&lt;br /&gt;
&lt;br /&gt;
* [[#Step 1: Identifying a Risk]]&lt;br /&gt;
* [[#Step 2: Factors for Estimating Likelihood]]&lt;br /&gt;
* [[#Step 3: Factors for Estimating Impact]]&lt;br /&gt;
* [[#Step 4: Determining Severity of the Risk]]&lt;br /&gt;
* [[#Step 5: Deciding What to Fix]]&lt;br /&gt;
* [[#Step 6: Customizing Your Risk Rating Model]]&lt;br /&gt;
&lt;br /&gt;
==Step 1: Identifying a Risk==&lt;br /&gt;
&lt;br /&gt;
The first step is to identify a security risk that needs to be rated. The tester needs to gather information about the [[threat agent]] involved, the [[attack]] that will be used, the [[vulnerability]] involved, and the [[impact]] of a successful exploit on the business. There may be multiple possible groups of attackers, or even multiple possible business impacts.  In general, it's best to err on the side of caution by using the worst-case option, as that will result in the highest overall risk.&lt;br /&gt;
&lt;br /&gt;
==Step 2: Factors for Estimating Likelihood==&lt;br /&gt;
&lt;br /&gt;
Once the tester has identified a potential risk and wants to figure out how serious it is, the first step is to estimate the &amp;quot;likelihood&amp;quot;. At the highest level, this is a rough measure of how likely this particular vulnerability is to be uncovered and exploited by an attacker. It is not necessary to be over-precise in this estimate. Generally, identifying whether the likelihood is low, medium, or high is sufficient.&lt;br /&gt;
&lt;br /&gt;
There are a number of factors that can help determine the likelihood. The first set of factors are related to the [[threat agent]] involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers. Note that there may be multiple threat agents that can exploit a particular vulnerability, so it's usually best to use the worst-case scenario. For example, an insider may be a much more likely attacker than an anonymous outsider, but it depends on a number of factors.&lt;br /&gt;
&lt;br /&gt;
Note that each factor has a set of options, and each option has a likelihood rating from 0 to 9 associated with it. These numbers will be used later to estimate the overall likelihood.&lt;br /&gt;
&lt;br /&gt;
===[[Threat Agent]] Factors===&lt;br /&gt;
&lt;br /&gt;
The first set of factors are related to the [[threat agent]] involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.&lt;br /&gt;
&lt;br /&gt;
; Skill level&lt;br /&gt;
: How technically skilled is this group of threat agents? No technical skills (1), some technical skills (3), advanced computer user (5), network and programming skills (6), security penetration skills (9), &lt;br /&gt;
&lt;br /&gt;
; Motive&lt;br /&gt;
: How motivated is this group of threat agents to find and exploit this vulnerability? Low or no reward (1), possible reward (4), high reward (9)&lt;br /&gt;
&lt;br /&gt;
; Opportunity&lt;br /&gt;
: What resources and opportunities are required for this group of threat agents to find and exploit this vulnerability? Full access or expensive resources required (0), special access or resources required (4), some access or resources required (7), no access or resources required (9)&lt;br /&gt;
&lt;br /&gt;
; Size&lt;br /&gt;
: How large is this group of threat agents? Developers (2), system administrators (2), intranet users (4), partners (5), authenticated users (6), anonymous Internet users (9)&lt;br /&gt;
&lt;br /&gt;
===[[Vulnerability]] Factors===&lt;br /&gt;
&lt;br /&gt;
The next set of factors are related to the [[vulnerability]] involved. The goal here is to estimate the likelihood of the particular vulnerability involved being discovered and exploited. Assume the threat agent selected above.&lt;br /&gt;
&lt;br /&gt;
; Ease of discovery&lt;br /&gt;
: How easy is it for this group of threat agents to discover this vulnerability? Practically impossible (1), difficult (3), easy (7), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Ease of exploit&lt;br /&gt;
: How easy is it for this group of threat agents to actually exploit this vulnerability? Theoretical (1), difficult (3), easy (5), automated tools available (9)&lt;br /&gt;
&lt;br /&gt;
; Awareness&lt;br /&gt;
: How well known is this vulnerability to this group of threat agents? Unknown (1), hidden (4), obvious (6), public knowledge (9)&lt;br /&gt;
&lt;br /&gt;
; Intrusion detection&lt;br /&gt;
: How likely is an exploit to be detected? Active detection in application (1), logged and reviewed (3), logged without review (8), not logged (9)&lt;br /&gt;
&lt;br /&gt;
==Step 3: Factors for Estimating Impact==&lt;br /&gt;
&lt;br /&gt;
When considering the impact of a successful attack, it's important to realize that there are two kinds of impacts. The first is the &amp;quot;technical impact&amp;quot; on the application, the data it uses, and the functions it provides.  The other is the &amp;quot;business impact&amp;quot; on the business and company operating the application.&lt;br /&gt;
&lt;br /&gt;
Ultimately, the business impact is more important. However, you may not have access to all the information required to figure out the business consequences of a successful exploit. In this case, providing as much detail about the technical risk will enable the appropriate business representative to make a decision about the business risk.&lt;br /&gt;
&lt;br /&gt;
Again, each factor has a set of options, and each option has an impact rating from 0 to 9 associated with it. We'll use these numbers later to estimate the overall impact.&lt;br /&gt;
&lt;br /&gt;
===Technical Impact Factors===&lt;br /&gt;
&lt;br /&gt;
Technical impact can be broken down into factors aligned with the traditional security areas of concern: confidentiality, integrity, availability, and accountability. The goal is to estimate the magnitude of the impact on the system if the vulnerability were to be exploited.&lt;br /&gt;
&lt;br /&gt;
; Loss of confidentiality&lt;br /&gt;
: How much data could be disclosed and how sensitive is it? Minimal non-sensitive data disclosed (2), minimal critical data disclosed (6), extensive non-sensitive data disclosed (6), extensive critical data disclosed (7), all data disclosed (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of integrity&lt;br /&gt;
: How much data could be corrupted and how damaged is it? Minimal slightly corrupt data (1), minimal seriously corrupt data (3), extensive slightly corrupt data (5), extensive seriously corrupt data (7), all data totally corrupt (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of availability&lt;br /&gt;
: How much service could be lost and how vital is it? Minimal secondary services interrupted (1), minimal primary services interrupted (5), extensive secondary services interrupted (5), extensive primary services interrupted (7), all services completely lost (9)&lt;br /&gt;
&lt;br /&gt;
; Loss of accountability&lt;br /&gt;
: Are the threat agents' actions traceable to an individual? Fully traceable (1), possibly traceable (7), completely anonymous (9)&lt;br /&gt;
&lt;br /&gt;
===Business Impact Factors===&lt;br /&gt;
&lt;br /&gt;
The business impact stems from the technical impact, but requires a deep understanding of what is important to the company running the application. In general, you should be aiming to support your risks with business impact, particularly if your audience is executive level. The business risk is what justifies investment in fixing security problems.&lt;br /&gt;
&lt;br /&gt;
Many companies have an asset classification guide and/or a business impact reference to help formalize what is important to their business. These standards can help you focus on what's truly important for security. If these aren't available, then it is necessary to talk with people who understand the business to get their take on what's important.&lt;br /&gt;
&lt;br /&gt;
The factors below are common areas for many businesses, but this area is even more unique to a company than the factors related to threat agent, vulnerability, and technical impact.&lt;br /&gt;
&lt;br /&gt;
; Financial damage&lt;br /&gt;
: How much financial damage will result from an exploit? Less than the cost to fix the vulnerability (1), minor effect on annual profit (3), significant effect on annual profit (7), bankruptcy (9)&lt;br /&gt;
&lt;br /&gt;
; Reputation damage&lt;br /&gt;
: Would an exploit result in reputation damage that would harm the business? Minimal damage (1), Loss of major accounts (4), loss of goodwill (5), brand damage (9)&lt;br /&gt;
&lt;br /&gt;
; Non-compliance&lt;br /&gt;
: How much exposure does non-compliance introduce? Minor violation (2), clear violation (5), high profile violation (7)&lt;br /&gt;
&lt;br /&gt;
; Privacy violation&lt;br /&gt;
: How much personally identifiable information could be disclosed? One individual (3), hundreds of people (5), thousands of people (7), millions of people (9)&lt;br /&gt;
&lt;br /&gt;
==Step 4: Determining the Severity of the Risk== &lt;br /&gt;
&lt;br /&gt;
In this step the likelihood estimate and the impact estimate are put together to calculate an overall severity for this risk.  This is done by figuring out whether the likelihood is low, medium, or high and then do the same for impact. The 0 to 9 scale is split into three parts:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table width=&amp;quot;40%&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Likelihood and Impact Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;0 to &amp;amp;lt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;50%&amp;quot; bgcolor=&amp;quot;lightgreen&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3 to &amp;amp;lt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6 to 9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Informal Method===&lt;br /&gt;
&lt;br /&gt;
In many environments, there is nothing wrong with reviewing the factors and simply capturing the answers. The tester should think through the factors and identify the key &amp;quot;driving&amp;quot; factors that are controlling the result. The tester may discover that their initial impression was wrong by considering aspects of the risk that weren't obvious.&lt;br /&gt;
&lt;br /&gt;
===Repeatable Method===&lt;br /&gt;
&lt;br /&gt;
If it is necessary to defend the ratings or make them repeatable, then it is necessary to go through a more formal process of rating the factors and calculating the result. Remember that there is quite a lot of uncertainty in these estimates and that these factors are intended to help the tester arrive at a sensible result. This process can be supported by automated tools to make the calculation easier. &lt;br /&gt;
&lt;br /&gt;
The first step is to select one of the options associated with each factor and enter the associated number in the table. Then simply take the average of the scores to calculate the overall likelihood. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;'''Threat agent factors'''&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;'''Vulnerability factors'''&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Skill level&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Motive&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Opportunity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Size&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;2%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Ease of discovery&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Ease of exploit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Awareness&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Intrusion detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;9&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall likelihood=4.375 (MEDIUM)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the tester needs to figure out the overall impact. The process is similar here. In many cases the answer will be obvious, but the tester can make an estimate based on the factors, or they can average the scores for each of the factors. Again, less than 3 is low, 3 to less than 6 is medium, and 6 to 9 is high.  For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Technical Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Business Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of confidentiality&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Loss of accountability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;2%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Financial damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Reputation damage&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Non-compliance&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;10%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Privacy violation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall technical impact=7.25 (HIGH)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td colspan=&amp;quot;4&amp;quot; bgcolor=&amp;quot;lightblue&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall business impact=2.25 (LOW)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Determining Severity===&lt;br /&gt;
&lt;br /&gt;
However the tester arrives at the likelihood and impact estimates, they can now combine them to get a final severity rating for this risk. Note that if they have good business impact information, they should use that instead of the technical impact information.  But if they have no information about the business, then technical impact is the next best thing.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;1&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Overall Risk Severity&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th rowspan=&amp;quot;4&amp;quot; width=&amp;quot;15%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Impact&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;15%&amp;quot; bgcolor=&amp;quot;pink&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Critical&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;red&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;High&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;lightgreen&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Note&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;yellow&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Low&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td bgcolor=&amp;quot;orange&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Medium&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;LOW&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;MEDIUM&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;HIGH&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Likelihood&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In the example above, the likelihood is medium and the technical impact is high, so from a purely technical perspective it appears that the overall severity is high.  However, note that the business impact is actually low, so the overall severity is best described as low as well. This is why understanding the business context of the vulnerabilities you are evaluating is so critical to making good risk decisions. Failure to understand this context can lead to the lack of trust between the business and security teams that is present in many organizations.&lt;br /&gt;
&lt;br /&gt;
==Step 5: Deciding What to Fix==&lt;br /&gt;
&lt;br /&gt;
After the risks to the application have been classified there will be a prioritized list of what to fix. As a general rule, the most severe risks should be fixed first. It simply doesn't help the overall risk profile to fix less important risks, even if they're easy or cheap to fix.&lt;br /&gt;
&lt;br /&gt;
Remember that not all risks are worth fixing, and some loss is not only expected, but justifiable based upon the cost of fixing the issue. For example, if it would cost $100,000 to implement controls to stem $2,000 of fraud per year, it would take 50 years return on investment to stamp out the loss. But remember there may be reputation damage from the fraud that could cost the organization much more.&lt;br /&gt;
&lt;br /&gt;
==Step 6: Customizing the Risk Rating Model==&lt;br /&gt;
&lt;br /&gt;
Having a risk ranking framework that is customizable for a business is critical for adoption.  A tailored model is much more likely to produce results that match people's perceptions about what is a serious risk. A lot of time can be wasted arguing about the risk ratings if they are not supported by a model like this. There are several ways to tailor this model for the organization.&lt;br /&gt;
&lt;br /&gt;
===Adding factors===&lt;br /&gt;
&lt;br /&gt;
The tester can choose different factors that better represent what's important for the specific organization. For example, a military application might add impact factors related to loss of human life or classified information. The tester might also add likelihood factors, such as the window of opportunity for an attacker or encryption algorithm strength.&lt;br /&gt;
&lt;br /&gt;
===Customizing options===&lt;br /&gt;
&lt;br /&gt;
There are some sample options associated with each factor, but the model will be much more effective if the tester customizes these options to the business. For example, use the names of the different teams and the company names for different classifications of information. The tester can also change the scores associated with the options. The best way to identify the right scores is to compare the ratings produced by the model with ratings produced by a team of experts. You can tune the model by carefully adjusting the scores to match.&lt;br /&gt;
&lt;br /&gt;
===Weighting factors===&lt;br /&gt;
&lt;br /&gt;
The model above assumes that all the factors are equally important. You can weight the factors to emphasize the factors that are more significant for the specific business. This makes the model a bit more complex, as the tester needs to use a weighted average. But otherwise everything works the same. Again it is possible to tune the model by matching it against risk ratings the business agrees are accurate.&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* Risk Centric Threat Modeling using Process for Attack Simulation &amp;amp; Threat Analysis (PASTA) [[Risk centric threat modeling PASTA|Risk centric threat modeling pasta]] &lt;br /&gt;
* Managing Information Security Risk: Organization, Mission, and Information System View [http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf]&lt;br /&gt;
* Industry standard vulnerability severity and risk rankings (CVSS) [http://www.first.org/cvss/]&lt;br /&gt;
* Security-enhancing process models (CLASP) [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project]&lt;br /&gt;
* Cheat Sheet: Web Application Security Frame - MSDN - Microsoft [http://msdn.microsoft.com/en-us/library/ff649461.aspx]&lt;br /&gt;
* [[Threat_Risk_Modeling|Threat Risk Modeling]]&lt;br /&gt;
* Pratical Threat Analysis [http://www.ptatechnologies.com/]&lt;br /&gt;
* Application Security Risk Assessment Guidelines [http://kb.wisc.edu/page.php?id=20262]&lt;br /&gt;
* A Platform for Risk Analysis of Security Critical Systems [http://sourceforge.net/projects/coras/]&lt;br /&gt;
* Model-driven Development and Analysis of Secure Information Systems [http://heim.ifi.uio.no/~ketils/securis/]&lt;br /&gt;
* Value Driven Security Threat Modeling Based on Attack Path Analysis [http://origin-www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550280a.pdf]&lt;br /&gt;
* [[:File:OWASP_Risk_Rating_Template_Example.xlsx|Risk Rating Template Example in MS Excel]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=245835</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=245835"/>
				<updated>2018-12-07T04:12:38Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and CEO of VerSprite - a global security consulting firm based in Atlanta, GA. He is also the author of Wiley's &amp;lt;i&amp;gt;Risk Centric Threat Modeling&amp;lt;/i&amp;gt;, a book endorsed by the late Cyber Security Coordinator for the White House, Howard Schmidt.  The book has been used in universities and enterprises world wide as a means to apply a risk  centric approach to application threat modeling. Tony has spoken at numerous OWASP, ISACA, ASIS, ISC2, ISSA, BSides conferences across four continents on the topics of cloud security, risk management, threat modeling, secure-SDLC implementation.  He also has provided global training to both development groups and company executives who need to understand the impact of security programs to products and business services. Before starting VerSprite, Tony's worked at various large multi-national companies, some of which includes GE Capital, UBS, Morgan Stanley, SunTrust Bank, Equifax, Symantec and Secureworks.  Today, his organization performs varied security consulting services worldwide for both Fortune 50, global companies as well as technology startups .&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is also well known for his leadership role in the Open Web Application Security Project (OWASP) where he runs the OWASP Atlanta Chapter and manages monthly workshops and events for Atlanta's AppSec community.   &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=234211</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=234211"/>
				<updated>2017-10-08T18:07:08Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and CEO of VerSprite - a global security consulting firm based in Atlanta, GA. He is also the author of Wiley's &amp;lt;i&amp;gt;Risk Centric Threat Modeling&amp;lt;/i&amp;gt;, a book endorsed by the late Cyber Security Coordinator for the White House, Howard Schmidt.  The book has been used in universities and enterprises world wide as a means to apply a risk  centric approach to application threat modeling. Tony has spoken at numerous OWASP, ISACA, ASIS, ISC2, ISSA, BSides conferences across four continents on the topics of cloud security, risk management, threat modeling, secure-SDLC implementation.  He also has provided global training to both development groups and company executives who need to understand the impact of security programs to products and business services. Tony's 25 years of IT/IS experience began with hands-on operations in the areas of system administration, network engineering, software development.  Tony serves as interim CISO for various startups and global, mid-size organization and is responsible for the overall build out of these security programs.&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He also organizes the yearly BSides Atlanta conference. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=233603</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=233603"/>
				<updated>2017-09-22T20:43:45Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and CEO of VerSprite - a global security consulting firm based in Atlanta, GA. He is also the author of Wiley's &amp;lt;i&amp;gt;Risk Centric Threat Modeling&amp;lt;/i&amp;gt;, a book endorsed by the late Cyber Security Coordinator for the White House, Howard Schmidt.  The book has been used in universities and enterprises world wide as a means to apply a risk  centric approach to application threat modeling. Tony has spoken at numerous OWASP, ISACA, ASIS, ISC2, ISSA, BSides conferences across four continents on the topics of cloud security, risk management, threat modeling, secure software development life cycles, and also conducted various training briefings to both development groups and company executives who need to understand the impact of security programs to business/ product objectives.  Tony's 20 years of IT/IS experience began with hands-on operations in the areas of system administration, network engineering, software development.  His IT formation, combined with his work in penetration testing, security engineering, security architecture, application security testing,  has served Tony well to speak on realistic challenges and solutions for IT groups and businesses alike in applying realistic security measures to enterprise processes.  Tony serves as interim CISO for various startups and mid-size organization and is responsible for the overall build out of these security programs.&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He also organizes BSides Atlanta – an underground grassroots un-conference that takes place annually and aims at providing new ideas and real conversations/ solutions around common challenges in InfoSec today. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=233602</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=233602"/>
				<updated>2017-09-22T20:39:53Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Tony UV */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and CEO of VerSprite - a global security consulting firm based in Atlanta, GA. He is also the author of Wiley's &amp;lt;i&amp;gt;Risk Centric Threat Modeling&amp;lt;/i&amp;gt;, a book based upon a patented methodology that applies a risk  centric approach to threat modeling. Tony has spoken at numerous OWASP, ISACA, ASIS, ISC2, ISSA, BSides conferences across four continents on the topics of cloud security, risk management, threat modeling, secure software development life cycles, and also conducted various training briefings to both development groups and company executives who need to understand the impact of security programs to business/ product objectives.  Tony's 20 years of IT/IS experience began with hands-on operations in the areas of system administration, network engineering, software development.  His IT formation, combined with his work in penetration testing, dynamic/ static application testing, security architecture, vulnerability and risk management,  has served Tony well to speak on realistic challenges and solutions for IT groups and businesses alike in applying realistic security measures to enterprise processes.  Tony serves as interim CISO for various startups and mid-size organization and is responsible for the overall build out of these security programs.&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He also organizes BSides Atlanta – an underground grassroots un-conference that takes place annually and aims at providing new ideas and real conversations/ solutions around common challenges in InfoSec today. &amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Threat_Modeling&amp;diff=230154</id>
		<title>Application Threat Modeling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Threat_Modeling&amp;diff=230154"/>
				<updated>2017-05-31T16:16:31Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: Kept DREAD changes made by previous editor even though changes under DREAD section where straight from Microsoft - originators of DREAD categorization model. Update Risk Ranking for threats to be more comprehensive.  Risk centric section added shortly&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Introduction===&lt;br /&gt;
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning. This, combined with the documentation produced as part of the threat modeling process, can give the reviewer a greater understanding of the system. This allows the reviewer to see where the entry points to the application are and the associated threats with each entry point. The concept of threat modeling is not new but there has been a clear mindset change in recent years. Modern threat modeling looks at a system from a potential attacker's perspective, as opposed to a defender's viewpoint. Microsoft have been strong advocates of the process over the past number of years. They have made threat modeling a core component of their SDLC, which they claim to be one of the reasons for the increased security of their products in recent years. &lt;br /&gt;
&lt;br /&gt;
When source code analysis is performed outside the SDLC, such as on existing applications, the results of the threat modeling help in reducing the complexity of the source code analysis by promoting an in-depth first approach vs. breadth first approach. Instead of reviewing all source code with equal focus, you can prioritize the security code review of components whose threat modeling has ranked with high risk threats. &lt;br /&gt;
&lt;br /&gt;
The threat modeling process can be decomposed into 3 high level steps:&lt;br /&gt;
&lt;br /&gt;
'''Step 1:''' Decompose the Application. &lt;br /&gt;
The first step in the threat modeling process is concerned with gaining an understanding of the application and how it interacts with external entities. This involves creating use-cases to understand how the application is used, identifying entry points to see where a potential attacker could interact with the application, identifying assets i.e. items/areas that the attacker would be interested in, and identifying trust levels which represent the access rights that the application will grant to external entities. This information is documented in the Threat Model document and it is also used to produce data flow diagrams (DFDs) for the application. The DFDs show the different paths through the system, highlighting the privilege boundaries. &lt;br /&gt;
&lt;br /&gt;
'''Step 2:''' Determine and rank threats.&lt;br /&gt;
Critical to the identification of threats is using a threat categorization methodology. A threat categorization such as STRIDE can be used, or the Application Security Frame (ASF) that defines threat categories such as Auditing &amp;amp; Logging, Authentication, Authorization, Configuration Management, Data Protection in Storage and Transit, Data Validation, Exception Management. The goal of the threat categorization is to help identify threats both from the attacker (STRIDE) and the defensive perspective (ASF). DFDs produced in step 1 help to identify the potential threat targets from the attacker's perspective, such as data sources, processes, data flows, and interactions with users. These threats can be identified further as the roots for threat trees; there is one tree for each threat goal. From the defensive perspective, ASF categorization helps to identify the threats as weaknesses of security controls for such threats. Common threat-lists with examples can help in the identification of such threats. Use and abuse cases can illustrate how existing protective measures could be bypassed, or where a lack of such protection exists. The determination of the security risk for each threat can be determined using a value-based risk model such as DREAD or a less subjective qualitative risk model based upon general risk factors (e.g. likelihood and impact).&lt;br /&gt;
&lt;br /&gt;
'''Step 3:''' Determine countermeasures and mitigation.&lt;br /&gt;
A lack of protection against a threat might indicate a vulnerability whose risk exposure could be mitigated with the implementation of a countermeasure. Such countermeasures can be identified using threat-countermeasure mapping lists. Once a risk ranking is assigned to the threats, it is possible to sort threats from the highest to the lowest risk, and prioritize the mitigation effort, such as by responding to such threats by applying the identified countermeasures. The risk mitigation strategy might involve evaluating these threats from the business impact that they pose and reducing  the risk. Other options might include taking the risk, assuming the business impact is acceptable because of compensating controls, informing the user of the threat, removing the risk posed by the threat completely, or the least preferable option, that is, to do nothing. &lt;br /&gt;
&lt;br /&gt;
Each of the above steps are documented as they are carried out. The resulting document is the threat model for the application. This guide will use an example to help explain the concepts behind threat modeling. The same example will be used throughout each of the 3 steps as a learning aid. The example that will be used is a college library website. At the end of the guide we will have produced the threat model for the college library website. Each of the steps in the threat modeling process are described in detail below.&lt;br /&gt;
&lt;br /&gt;
== Decompose the Application ==&lt;br /&gt;
The goal of this step is to gain an understanding of the application and how it interacts with external entities. This goal is achieved by information gathering and documentation. The information gathering process is carried out using a clearly defined structure, which ensures the correct information is collected. This structure also defines how the information should be documented to produce the Threat Model. &lt;br /&gt;
&lt;br /&gt;
==Threat Model Information==&lt;br /&gt;
The first item in the threat model is the information relating to the threat model. &lt;br /&gt;
This must include the the following:&lt;br /&gt;
&lt;br /&gt;
# '''Application Name''' - The name of the application.&lt;br /&gt;
# '''Application Version''' - The version of the application.&lt;br /&gt;
# '''Description''' - A high level description of the application.&lt;br /&gt;
# '''Document Owner''' - The owner of the threat modeling document. &lt;br /&gt;
# '''Participants''' - The participants involved in the threat modeling process for this application.&lt;br /&gt;
# '''Reviewer''' - The reviewer(s) of the threat model.&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Category:FIXME|the list above includes an Application name, but the example does not have one]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Threat Model Information&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Application Version:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.0&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt; Description:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website is the first implementation of a website to provide librarians and library patrons (students and college staff) with online services. &lt;br /&gt;
As this is the first implementation of the website, the functionality will be limited. There will be three users of the application: &amp;lt;br /&amp;gt;&lt;br /&gt;
1. Students&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Staff&amp;lt;br /&amp;gt;&lt;br /&gt;
3. Librarians&amp;lt;br /&amp;gt;&lt;br /&gt;
Staff and students will be able to log in and search for books, and staff members can request books. Librarians will be able to log in, add books, add users, and search for books.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Document Owner:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;David Lowry&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Participants:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;David Rook&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Reviewer:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Eoin Keary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Dependencies==&lt;br /&gt;
External dependencies are items external to the code of the application that may pose a threat to the application. These items are typically still within the control of the organization, but possibly not within the control of the development team. The first area to look at when investigating external dependencies is how the application will be deployed in a production environment, and what are the requirements surrounding this. This involves looking at how the application is or is not intended to be run. For example if the application is expected to be run on a server that has been hardened to the organization's hardening standard and it is expected to sit behind a firewall, then this information should be documented in the external dependencies section. External dependencies should be documented as follows:&lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique ID assigned to the external dependency.&lt;br /&gt;
# '''Description''' - A textual description of the external dependency.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;External Dependencies&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website will run on a Linux server running Apache.  This server will be hardened as per the college's server hardening standard. This includes the application of the latest operating system and application security patches.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database server will be MySQL and it will run on a Linux server. This server will be hardened as per the college's server hardening standard. This will include the application of the lastest operating system and application security patches.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The connection between the Web Server and the database server will be over a private network.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Web Server is behind a firewall and the only communication available is TLS.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Entry Points==&lt;br /&gt;
Entry points define the interfaces through which potential attackers can interact with the application or supply it with data. In order for a potential attacker to attack an application, entry points must exist. Entry points in an application can be layered, for example each web page in a web application may contain multiple entry points. Entry points should be documented as follows: &lt;br /&gt;
&lt;br /&gt;
#  '''ID''' - A unique ID assigned to the entry point. This will be used to cross reference the entry point with any threats or vulnerabilities that are identified. In the case of layer entry points, a major.minor notation should be used.&lt;br /&gt;
# '''Name''' - A descriptive name identifying the entry point and its purpose.&lt;br /&gt;
# '''Description''' - A textual description detailing the interaction or processing that occurs at the entry point.&lt;br /&gt;
# '''Trust Levels''' - The level of access required at the entry point is documented here. These will be cross referenced with the trusts levels defined later in the document.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Entry Points&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;15%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;45%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTPS Port&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website will be only be accessible via TLS. All pages within the college library website are layered on this entry point.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Library Main Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The splash page for the college library website is the entry point for all users.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Students, faculty members and librarians must log in to the college library website before they can carry out any of the use cases.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Function&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login function accepts user supplied credentials and compares them with those in the database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Search Entry Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The page used to enter a search query.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Assets==&lt;br /&gt;
The system must have something that the attacker is interested in; these items/areas of interest are defined as assets. Assets are essentially threat targets, i.e. they are the reason threats will exist. Assets can be both physical assets and abstract assets. For example, an asset of an application might be a list of clients and their personal information; this is a physical asset. An abstract asset might be the reputation of an organization. Assets are documented in the threat model as follows: &lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique ID is assigned to identify each asset. This will be used to cross reference the asset with any threats or vulnerabilities that are identified.&lt;br /&gt;
# '''Name''' - A descriptive name that clearly identifies the asset.&lt;br /&gt;
# '''Description''' - A textual description of what the asset is and why it needs to be protected.&lt;br /&gt;
# '''Trust Levels''' - The level of access required to access the entry point is documented here. These will be cross referenced with the trust levels defined in the next step.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Assets&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;15%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;55%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Library Users and Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to students, faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User Login Details&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login credentials that a student or a faculty member will use to log into the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Librarian Login Details&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login credentials that a Librarian will use to log into the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The College Library website will store personal information relating to the students, faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;System&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to the underlying system.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Availability of College Library Website&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The College Library website should be available 24 hours a day and can be accessed by all students, college faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute Code as a Web Server User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute source code on the web server as a web server user.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute SQL as a Database Read User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute SQL select queries on the database, and thus retrieve any information stored within the College Library database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute SQL as a Database Read/Write User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute SQL. Select, insert, and update queries on the database and thus have read and write access to any information stored within the College Library database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Website&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Session&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the login session of a user to the College Library website. This user could be a student, a member of the college faculty, or a Librarian.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to the Database Server&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to the database server allows you to administer the database, giving you full access to the database users and all data contained within the database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Create Users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The ability to create users would allow an individual to create new users on the system. These could be student users, faculty member users, and librarian users.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to Audit Data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The audit data shows all audit-able events that occurred within the College Library application by students, staff, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(6) Website Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trust Levels==&lt;br /&gt;
Trust levels represent the access rights that the application will grant to external entities. The trust levels are cross referenced with the entry points and assets. This allows us to define the access rights or privileges required at each entry point, and those required to interact with each asset. Trust levels are documented in the threat model as follows: &lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique number is assigned to each trust level. This is used to cross reference the trust level with the entry points and assets.&lt;br /&gt;
# '''Name''' - A descriptive name that allows you to identify the external entities that have been granted this trust level.&lt;br /&gt;
# '''Description''' - A textual description of the trust level detailing the external entity who has been granted the trust level.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;70%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Anonymous Web User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website but has not provided valid credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User with Valid Login Credentials&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website and has logged in using valid login credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User with Invalid Login Credentials&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website and is attempting to log in using invalid login credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The librarian can create users on the library website and view their personal information.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Server Administrator&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database server administrator has read and write access to the database that is used by the college library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Website Administrator&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Website administrator can configure the college library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Web Server User Process&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the process/user that the web server executes code as and authenticates itself against the database server as.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Read User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database user account used to access the database for read access.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Read/Write User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database user account used to access the database for read and write access.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Data Flow Diagrams==&lt;br /&gt;
All of the information collected allows us to accurately model the application through the use of Data Flow Diagrams (DFDs). The DFDs will allow us to gain a better understanding of the application by providing a visual representation of how the application processes data. The focus of the DFDs is on how data moves through the application and what happens to the data as it moves. DFDs are hierarchical in structure, so they can be used to decompose the application into subsystems and lower-level subsystems. The high level DFD will allow us to clarify the scope of the application being modeled. The lower level iterations will allow us to focus on the specific processes involved when processing specific data. There are a number of symbols that are used in DFDs for threat modeling. These are described below:&lt;br /&gt;
&lt;br /&gt;
'''External Entity'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The external entity shape is used to represent any entity outside the application that interacts with the application via an entry point.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_external_entity.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Process'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The process shape represents a task that handles data within the application. The task may process the data or perform an action based on the data.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_process.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Multiple Process'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The multiple process shape is used to present a collection of subprocesses. The multiple process can be broken down into its subprocesses in another DFD.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_multiple_process.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Data Store'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The data store shape is used to represent locations where data is stored. Data stores do not modify the data, they only store data.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_data_store.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Data Flow'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The data flow shape represents data movement within the application. The direction of the data movement is represented by the arrow.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_data_flow.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
'''Privilege Boundary'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The privilege boundary shape is used to represent the change of privilege levels as the data flows through the application.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_privilge_boundary.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example===&lt;br /&gt;
&amp;lt;br /&amp;gt; '''Data Flow Diagram for the College Library Website'''&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:Data flow1.jpg]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
'''User Login Data Flow Diagram for the College Library Website'''&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:Data flow2.jpg]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Determine and Rank Threats ==&lt;br /&gt;
===Threat Categorization===&lt;br /&gt;
The first step in the determination of threats is adopting a threat categorization. A threat categorization provides a set of threat categories with corresponding examples so that threats can be systematically identified in the application in a structured and repeatable manner. &lt;br /&gt;
&lt;br /&gt;
====STRIDE====&lt;br /&gt;
A threat categorization such as STRIDE is useful in the identification of threats by classifying attacker goals such as:&lt;br /&gt;
*Spoofing&lt;br /&gt;
*Tampering&lt;br /&gt;
*Repudiation&lt;br /&gt;
*Information Disclosure&lt;br /&gt;
*Denial of Service&lt;br /&gt;
*Elevation of Privilege.&lt;br /&gt;
&lt;br /&gt;
A threat list of generic threats organized in these categories with examples and the affected security controls is provided in the following table:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;STRIDE Threat List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Examples&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Security Control&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Spoofing&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to illegally access and use another user's credentials, such as username and password.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tampering&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to maliciously change/modify persistent data, such as persistent data in a database, and the alteration of data in transit between two computers over an open network, such as the Internet.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Repudiation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to perform illegal operations in a system that lacks the ability to trace the prohibited operations.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Non-Repudiation&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Information disclosure&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action to read a file that one was not granted access to, or to read data in transit. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Confidentiality&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Denial of service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat aimed to deny access to valid users, such as by making a web server temporarily unavailable or unusable. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Elevation of privilege&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat aimed to gain privileged access to resources for gaining unauthorized access to information or to compromise a system.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authorization&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Security Controls==&lt;br /&gt;
Once the basic threat agents and business impacts are understood, the review team should try to identify the set of controls that could prevent these threat agents from causing those impacts.  The primary focus of the code review should be to ensure that these security controls are in place, that they work properly, and that they are correctly invoked in all the necessary places. The checklist below can help to ensure that all the likely risks have been considered.&lt;br /&gt;
&lt;br /&gt;
'''Authentication:'''&lt;br /&gt;
*Ensure all internal and external connections (user and entity) go through an appropriate and adequate form of authentication. Be assured that this control cannot be bypassed. &lt;br /&gt;
*Ensure all pages enforce the requirement for authentication. &lt;br /&gt;
*Ensure that whenever authentication credentials or any other sensitive information is passed, only accept the information via the HTTP “POST” method and will not accept it via the HTTP “GET” method. &lt;br /&gt;
*Any page deemed by the business or the development team as being outside the scope of authentication should be reviewed in order to assess any possibility of security breach. &lt;br /&gt;
*Ensure that authentication credentials do not traverse the wire in clear text form. &lt;br /&gt;
*Ensure development/debug backdoors are not present in production code. &lt;br /&gt;
&lt;br /&gt;
'''Authorization: '''&lt;br /&gt;
*Ensure that there are authorization mechanisms in place. &lt;br /&gt;
*Ensure that the application has clearly defined the user types and the rights of said users. &lt;br /&gt;
*Ensure there is a least privilege stance in operation. &lt;br /&gt;
*Ensure that the Authorization mechanisms work properly, fail securely, and cannot be circumvented. &lt;br /&gt;
*Ensure that authorization is checked on every request. &lt;br /&gt;
*Ensure development/debug backdoors are not present in production code. &lt;br /&gt;
&lt;br /&gt;
'''Cookie Management: '''&lt;br /&gt;
*Ensure that sensitive information is not comprised. &lt;br /&gt;
*Ensure that unauthorized activities cannot take place via cookie manipulation. &lt;br /&gt;
*Ensure that proper encryption is in use. &lt;br /&gt;
*Ensure secure flag is set to prevent accidental transmission over “the wire” in a non-secure manner. &lt;br /&gt;
*Determine if all state transitions in the application code properly check for the cookies and enforce their use. &lt;br /&gt;
*Ensure the session data is being validated. &lt;br /&gt;
*Ensure cookies contain as little private information as possible. &lt;br /&gt;
*Ensure entire cookie is encrypted if sensitive data is persisted in the cookie. &lt;br /&gt;
*Define all cookies being used by the application, their name, and why they are needed. &lt;br /&gt;
&lt;br /&gt;
'''Data/Input Validation: '''&lt;br /&gt;
*Ensure that a DV mechanism is present. &lt;br /&gt;
*Ensure all input that can (and will) be modified by a malicious user such as HTTP headers, input fields, hidden fields, drop down lists, and other web components are properly validated. &lt;br /&gt;
*Ensure that the proper length checks on all input exist. &lt;br /&gt;
*Ensure that all fields, cookies, http headers/bodies, and form fields are validated. &lt;br /&gt;
*Ensure that the data is well formed and contains only known good chars if possible. &lt;br /&gt;
*Ensure that the data validation occurs on the server side. &lt;br /&gt;
*Examine where data validation occurs and if a centralized model or decentralized model is used. &lt;br /&gt;
*Ensure there are no backdoors in the data validation model. &lt;br /&gt;
*'''Golden Rule: All external input, no matter what it is, is examined and validated. '''&lt;br /&gt;
&lt;br /&gt;
'''Error Handling/Information leakage: '''&lt;br /&gt;
*Ensure that all method/function calls that return a value have proper error handling and return value checking. &lt;br /&gt;
*Ensure that exceptions and error conditions are properly handled. &lt;br /&gt;
*Ensure that no system errors can be returned to the user. &lt;br /&gt;
*Ensure that the application fails in a secure manner. &lt;br /&gt;
*Ensure resources are released if an error occurs. &lt;br /&gt;
&lt;br /&gt;
'''Logging/Auditing: '''&lt;br /&gt;
*Ensure that no sensitive information is logged in the event of an error. &lt;br /&gt;
*Ensure the payload being logged is of a defined maximum length and that the logging mechanism enforces that length. &lt;br /&gt;
*Ensure no sensitive data can be logged; e.g. cookies, HTTP “GET” method, authentication credentials. &lt;br /&gt;
*Examine if the application will audit the actions being taken by the application on behalf of the client (particularly data manipulation/Create, Update, Delete (CUD) operations). &lt;br /&gt;
*Ensure successful and unsuccessful authentication is logged. &lt;br /&gt;
*Ensure application errors are logged. &lt;br /&gt;
*Examine the application for debug logging with the view to logging of sensitive data. &lt;br /&gt;
&lt;br /&gt;
'''Cryptography: '''&lt;br /&gt;
*Ensure no sensitive data is transmitted in the clear, internally or externally. &lt;br /&gt;
*Ensure the application is implementing known good cryptographic methods. &lt;br /&gt;
&lt;br /&gt;
'''Secure Code Environment: '''&lt;br /&gt;
*Examine the file structure. Are any components that should not be directly accessible available to the user?&lt;br /&gt;
*Examine all memory allocations/de-allocations. &lt;br /&gt;
*Examine the application for dynamic SQL and determine if it is vulnerable to injection. &lt;br /&gt;
*Examine the application for “main()” executable functions and debug harnesses/backdoors.&lt;br /&gt;
*Search for commented out code, commented out test code, which may contain sensitive information. &lt;br /&gt;
*Ensure all logical decisions have a default clause. &lt;br /&gt;
*Ensure no development environment kit is contained on the build directories. &lt;br /&gt;
*Search for any calls to the underlying operating system or file open calls and examine the error possibilities. &lt;br /&gt;
&lt;br /&gt;
'''Session Management: '''&lt;br /&gt;
*Examine how and when a session is created for a user, unauthenticated and authenticated. &lt;br /&gt;
*Examine the session ID and verify if it is complex enough to fulfill requirements regarding strength. &lt;br /&gt;
*Examine how sessions are stored: e.g. in a database, in memory etc. &lt;br /&gt;
*Examine how the application tracks sessions. &lt;br /&gt;
*Determine the actions the application takes if an invalid session ID occurs. &lt;br /&gt;
*Examine session invalidation. &lt;br /&gt;
*Determine how multithreaded/multi-user session management is performed. &lt;br /&gt;
*Determine the session HTTP inactivity timeout. &lt;br /&gt;
*Determine how the log-out functionality functions.&lt;br /&gt;
&lt;br /&gt;
==Threat Analysis==&lt;br /&gt;
The prerequisite in the analysis of threats is the understanding of the generic definition of risk that is the probability that a threat agent will exploit a vulnerability to cause an impact to the application. From the perspective of risk management, threat modeling is the systematic and strategic approach for identifying and enumerating threats to an application environment with the objective of minimizing risk and the associated impacts. &lt;br /&gt;
&lt;br /&gt;
Threat analysis as such is the identification of the threats to the application, and involves the analysis of each aspect of the application functionality and architecture and design to identify and classify potential weaknesses that could lead to an exploit. &lt;br /&gt;
&lt;br /&gt;
In the first threat modeling step, we have modeled the system showing data flows, trust boundaries, process components, and entry and exit points. An example of such modeling is shown in the Example: Data Flow Diagram for the College Library Website. &lt;br /&gt;
&lt;br /&gt;
Data flows show how data flows logically through the end to end, and allows the identification of affected components through critical points (i.e. data entering or leaving the system, storage of data) and the flow of control through these components. Trust boundaries show any location where the level of trust changes. Process components show where data is processed, such as web servers, application servers, and database servers. Entry points show where data enters the system (i.e. input fields, methods) and exit points are where it leaves the system (i.e. dynamic output, methods), respectively. Entry and exit points define a trust boundary. &lt;br /&gt;
&lt;br /&gt;
Threat lists based on the STRIDE model are useful in the identification of threats with regards to the attacker goals. For example, if the threat scenario is attacking the login, would the attacker brute force the password to break the authentication? If the threat scenario is to try to elevate privileges to gain another user’s privileges, would the attacker try to perform forceful browsing? &lt;br /&gt;
&lt;br /&gt;
It is vital that all possible attack vectors should be evaluated from the attacker’s point of view. For this reason, it is also important to consider entry and exit points, since they could also allow the realization of certain kinds of threats. For example, the login page allows sending authentication credentials, and the input data accepted by an entry point has to validate for potential malicious input to exploit vulnerabilities such as SQL injection, cross site scripting, and buffer overflows. Additionally, the data flow passing through that point has to be used to determine the threats to the entry points to the next components along the flow. If the following components can be regarded critical (e.g. the hold sensitive data), that entry point can be regarded more critical as well. In an end to end data flow, for example, the input data (i.e. username and password) from a login page, passed on without validation,  could be exploited for a SQL injection attack to manipulate a query for breaking the authentication or to modify a table in the database. &lt;br /&gt;
&lt;br /&gt;
Exit points might serve as attack points to the client (e.g. XSS vulnerabilities) as well for the realization of information disclosure vulnerabilities. For example, in the case of exit points from components handling confidential data (e.g. data access components), exit points lacking security controls to protect the confidentiality and integrity can lead to disclosure of such confidential information to an unauthorized user. &lt;br /&gt;
&lt;br /&gt;
In many cases threats enabled by exit points are related to the threats of the corresponding entry point. In the login example, error messages returned to the user via the exit point might allow for entry point attacks, such as account harvesting (e.g. username not found), or SQL injection (e.g. SQL exception errors). &lt;br /&gt;
&lt;br /&gt;
From the defensive perspective, the identification of threats driven by security control categorization such as ASF, allows a threat analyst to focus on specific issues related to weaknesses (e.g. vulnerabilities) in security controls. Typically the process of threat identification involves going through iterative cycles where initially all the possible threats in the threat list that apply to each component are evaluated. &lt;br /&gt;
&lt;br /&gt;
At the next iteration, threats are further analyzed by exploring the attack paths, the root causes (e.g. vulnerabilities, depicted as orange blocks) for the threat to be exploited, and the necessary mitigation controls (e.g. countermeasures, depicted as green blocks). A threat tree as shown in figure 2 is useful to perform such threat analysis &lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Graph.gif|Figure 2: Threat Graph]]&lt;br /&gt;
&lt;br /&gt;
Once common threats, vulnerabilities, and attacks are assessed, a more focused threat analysis should take in consideration use and abuse cases. By thoroughly analyzing the use scenarios, weaknesses can be identified that could lead to the realization of a threat. Abuse cases should be identified as part of the security requirement engineering activity. These abuse cases can illustrate how existing protective measures could be bypassed, or where a lack of such protection exists. A use and misuse case graph for authentication is shown in figure below:&lt;br /&gt;
&lt;br /&gt;
[[Image:UseAndMisuseCase.jpg|640px|Figure 3: Use and Misuse Case]]&lt;br /&gt;
&lt;br /&gt;
Finally, it is possible to bring all of this together by determining the types of threat to each component of the decomposed system. This can be done by using a threat categorization such as STRIDE or ASF, the use of threat trees to determine how the threat can be exposed by a vulnerability, and use and misuse cases to further validate the lack of a countermeasure to mitigate the threat.&lt;br /&gt;
&lt;br /&gt;
To apply STRIDE to the data flow diagram items the following table can be used: &lt;br /&gt;
&lt;br /&gt;
TABLE&lt;br /&gt;
&lt;br /&gt;
==Risk Ranking of Threats==&lt;br /&gt;
Threats can be ranked from the perspective of various factors, all depending on the approach and methodology applied.  A risk centric threat model such as PASTA (Process for Attack Simulation &amp;amp; Threat Analysis) focuses on prioritization based upon risks to the product, information owners, business or other stakeholders.  A security centric approach may rank threats based upon ease of exploitation, technical impact to the product or application.  A software centric approach may prioritize threats based upon the adverse effects they may have against functional use cases and software features.  The largest different amongst the three approaches (and thereby) ranking of threats is largely based upon goals of each approach.  PASTA is focused on addressing the most likely and most impacting to the business.  Security centric is focused on threat coverage, and ranking based upon more technical impact levels and ease of exploitation.  Software centric ranking efforts will be driven by threats that affect code quality or functional use of application use cases.&lt;br /&gt;
&lt;br /&gt;
Generic risk models can also be applied to the security and software centric approaches in order to create a prioritized list of threats to support a risk mitigation strategy, such as deciding on which threats have to be mitigated first. Generic risk factors can be used to determine which threats can be ranked as High, Medium, or Low risk. In general, threat risk models use different factors to model risks such as those shown in figure below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Riskfactors.JPG|Figure 3: Risk Model Factors]]&lt;br /&gt;
&lt;br /&gt;
==DREAD==&lt;br /&gt;
In the Microsoft DREAD threat-risk ranking model, the technical risk factors for impact are Damage and Affected Users, while the ease of exploitation factors are Reproducibility, Exploitability and Discoverability. This risk factorization allows the assignment of values to the different influencing factors of a threat. To determine the ranking of a threat, the threat analyst has to answer basic questions for each factor of risk, for example: &lt;br /&gt;
&lt;br /&gt;
*For Damage: How big would the damage be if the attack succeeded?&lt;br /&gt;
*For Reproducibility: How easy is it to reproduce an attack to work?&lt;br /&gt;
*For Exploitability: How much time, effort, and expertise is needed to exploit the threat?&lt;br /&gt;
*For Affected Users: If a threat were exploited, what percentage of users would be affected?&lt;br /&gt;
*For Discoverability: How easy is it for an attacker to discover this threat?&lt;br /&gt;
&lt;br /&gt;
By referring to the college library website it is possible to document sample threats related to the use cases such as: &lt;br /&gt;
&lt;br /&gt;
'''Threat: Malicious user views confidential information of students, faculty members and librarians.'''&lt;br /&gt;
# '''Damage potential:''' Threat to reputation as well as financial and legal liability:8&lt;br /&gt;
# '''Reproducibility:'''  Fully reproducible:10&lt;br /&gt;
# '''Exploitability:'''   Require to be on the same subnet or have compromised a router:7&lt;br /&gt;
# '''Affected users:'''   Affects all users:10&lt;br /&gt;
# '''Discoverability:'''  Can be found out easily:10&lt;br /&gt;
&lt;br /&gt;
Overall DREAD score: (8+10+7+10+10) / 5 = 9&lt;br /&gt;
&lt;br /&gt;
In this case having 9 on a 10 point scale is certainly a high risk threat&lt;br /&gt;
&lt;br /&gt;
==Generic Risk Model==&lt;br /&gt;
A more generic risk model takes into consideration the Likelihood (e.g. probability of an attack) and the Impact (e.g. damage potential): &lt;br /&gt;
&lt;br /&gt;
'''Risk = Likelihood x Impact'''&lt;br /&gt;
&lt;br /&gt;
The likelihood or probability is defined by the ease of exploitation, which mainly depends on the type of threat and the system characteristics, and by the possibility to realize a threat, which is determined by the existence of an appropriate countermeasure.  &lt;br /&gt;
&lt;br /&gt;
The following is a set of considerations for determining ease of exploitation: &lt;br /&gt;
# Can an attacker exploit this remotely? &lt;br /&gt;
# Does the attacker need to be authenticated?&lt;br /&gt;
# Can the exploit be automated?&lt;br /&gt;
&lt;br /&gt;
The impact mainly depends on the damage potential and the extent of the impact, such as the number of components that are affected by a threat. &lt;br /&gt;
&lt;br /&gt;
Examples to determine the damage potential are:&lt;br /&gt;
# Can an attacker completely take over and manipulate the system?  &lt;br /&gt;
# Can an attacker gain administration access to the system?&lt;br /&gt;
# Can an attacker crash the system? &lt;br /&gt;
# Can the attacker obtain access to sensitive information such as secrets, PII&lt;br /&gt;
&lt;br /&gt;
Examples to determine the number of components that are affected by a threat:&lt;br /&gt;
# How many data sources and systems can be impacted?&lt;br /&gt;
# How “deep” into the infrastructure can the threat agent go?&lt;br /&gt;
&lt;br /&gt;
These examples help in the calculation of the overall risk values by assigning qualitative values such as High, Medium and Low to Likelihood and Impact factors. In this case, using qualitative values, rather than numeric ones like in the case of the DREAD model, help avoid the ranking becoming overly subjective.&lt;br /&gt;
&lt;br /&gt;
==Countermeasure Identification==&lt;br /&gt;
The purpose of the countermeasure identification is to determine if there is some kind of protective measure (e.g. security control, policy measures) in place that can prevent each threat previously identified via threat analysis from being realized. Vulnerabilities are then those threats that have no countermeasures. Since each of these threats has been categorized either with STRIDE or ASF, it is possible to find appropriate countermeasures in the application within the given category. &lt;br /&gt;
&lt;br /&gt;
Provided below is a brief and limited checklist which is by no means an exhaustive list for identifying countermeasures for specific threats. &lt;br /&gt;
 &lt;br /&gt;
Example of countermeasures for ASF threat types are included in the following table: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;ASF Threat &amp;amp; Countermeasures List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Threat Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Countermeasure&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Credentials and authentication tokens are protected with encryption in storage and transit&lt;br /&gt;
#Protocols are resistant to brute force, dictionary, and replay attacks&lt;br /&gt;
#Strong password policies are enforced&lt;br /&gt;
#Trusted server authentication is used instead of SQL authentication&lt;br /&gt;
#Passwords are stored with salted hashes&lt;br /&gt;
#Password resets do not reveal password hints and valid usernames&lt;br /&gt;
#Account lockouts do not result in a denial of service attack&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authorization&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Strong ACLs are used for enforcing authorized access to resources&lt;br /&gt;
#Role-based access controls are used to restrict access to specific operations&lt;br /&gt;
#The system follows the principle of least privilege for user and service accounts&lt;br /&gt;
#Privilege separation is correctly configured within the presentation, business and data access layers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Configuration Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Least privileged processes are used and service accounts with no administration capability&lt;br /&gt;
#Auditing and logging of all administration activities is enabled&lt;br /&gt;
#Access to configuration files and administrator interfaces is restricted to administrators&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Data Protection in Storage and Transit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Standard encryption algorithms and correct key sizes are being used&lt;br /&gt;
#Hashed message authentication codes (HMACs) are used to protect data integrity&lt;br /&gt;
#Secrets (e.g. keys, confidential data ) are cryptographically protected both in transport and in storage&lt;br /&gt;
#Built-in secure storage is used for protecting keys&lt;br /&gt;
#No credentials and sensitive data are sent in clear text over the wire&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Data Validation / Parameter Validation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Data type, format, length, and range checks are enforced&lt;br /&gt;
#All data sent from the client is validated&lt;br /&gt;
#No security decision is based upon parameters (e.g. URL parameters) that can be manipulated&lt;br /&gt;
#Input filtering via white list validation is used&lt;br /&gt;
#Output encoding is used&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Error Handling and Exception Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#All exceptions are handled in a structured manner&lt;br /&gt;
#Privileges are restored to the appropriate level in case of errors and exceptions&lt;br /&gt;
#Error messages are scrubbed so that no sensitive information is revealed to the attacker&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User and Session Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#No sensitive information is stored in clear text in the cookie&lt;br /&gt;
#The contents of the authentication cookies is encrypted&lt;br /&gt;
#Cookies are configured to expire&lt;br /&gt;
#Sessions are resistant to replay attacks&lt;br /&gt;
#Secure communication channels are used to protect authentication cookies&lt;br /&gt;
#User is forced to re-authenticate when performing critical functions&lt;br /&gt;
#Sessions are expired at logout&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Auditing and Logging&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Sensitive information (e.g. passwords, PII) is not logged&lt;br /&gt;
#Access controls (e.g. ACLs) are enforced on log files to prevent un-authorized access&lt;br /&gt;
#Integrity controls (e.g. signatures) are enforced on log files to provide non-repudiation&lt;br /&gt;
#Log files provide for audit trail for sensitive operations and logging of key events&lt;br /&gt;
#Auditing and logging is enabled across the tiers on multiple servers&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using STRIDE, the following threat-mitigation table can be used to identify techniques that can be employed to mitigate the threats.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;STRIDE Threat &amp;amp; Mitigation Techniques List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Threat Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Mitigation Techniques&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Spoofing Identity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authentication&lt;br /&gt;
#Protect secret data&lt;br /&gt;
#Don't store secrets&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tampering with data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authorization&lt;br /&gt;
#Hashes&lt;br /&gt;
#MACs&lt;br /&gt;
#Digital signatures&lt;br /&gt;
#Tamper resistant protocols&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Repudiation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Digital signatures&lt;br /&gt;
#Timestamps&lt;br /&gt;
#Audit trails&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Information Disclosure&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Authorization&lt;br /&gt;
#Privacy-enhanced protocols&lt;br /&gt;
#Encryption&lt;br /&gt;
#Protect secrets&lt;br /&gt;
#Don't store secrets&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Denial of Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authentication&lt;br /&gt;
#Appropriate authorization&lt;br /&gt;
#Filtering&lt;br /&gt;
#Throttling&lt;br /&gt;
#Quality of service&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Elevation of privilege&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Run with least privilege&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Once threats and corresponding countermeasures are identified it is possible to derive a threat profile with the following criteria:&lt;br /&gt;
&lt;br /&gt;
# '''Non mitigated threats:''' Threats which have no countermeasures and represent vulnerabilities that can be fully exploited and cause an impact &lt;br /&gt;
# '''Partially mitigated threats:''' Threats partially mitigated by one or more countermeasures which represent vulnerabilities that can only partially be exploited and cause a limited impact &lt;br /&gt;
# '''Fully mitigated threats:''' These threats have appropriate countermeasures in place and do not expose vulnerability and cause impact&lt;br /&gt;
&lt;br /&gt;
===Mitigation Strategies===&lt;br /&gt;
The objective of risk management is to reduce the impact that the exploitation of a threat can have to the application. This can be done by responding to a threat with a risk mitigation strategy. In general there are five options to mitigate threats &lt;br /&gt;
# '''Do nothing:''' for example, hoping for the best&lt;br /&gt;
# '''Inform about the risk:''' for example, warning user population about the risk&lt;br /&gt;
# '''Mitigate the risk:''' for example, by putting countermeasures in place&lt;br /&gt;
# '''Accept the risk:''' for example, after evaluating the impact of the exploitation (business impact)&lt;br /&gt;
# '''Transfer the risk:''' for example, through contractual agreements and insurance&lt;br /&gt;
# '''Terminate the risk:''' for example, shutdown, turn-off, unplug or decommission the asset&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The decision of which strategy is most appropriate depends on the impact an exploitation of a threat can have, the likelihood of its occurrence, and the costs for transferring (i.e. costs for insurance) or avoiding (i.e. costs or losses due redesign) it. That is, such decision is based on the risk a threat poses to the system. Therefore, the chosen strategy does not mitigate the threat itself but the risk it poses to the system. Ultimately the overall risk has to take into account the business impact, since this is a critical factor for the business risk management strategy. One strategy could be to fix only the vulnerabilities for which the cost to fix is less than the potential business impact derived by the exploitation of the vulnerability. Another strategy could be to accept the risk when the loss of some security controls (e.g. Confidentiality, Integrity, and Availability) implies a small degradation of the service, and not a loss of a critical business function. In some cases, transfer of the risk to another service provider might also be an option. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
[[Category:Threat_Modeling]]&lt;br /&gt;
[[Category:SAMM-TA-1]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Application_Threat_Modeling&amp;diff=230140</id>
		<title>Application Threat Modeling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Application_Threat_Modeling&amp;diff=230140"/>
				<updated>2017-05-31T03:47:19Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* DREAD */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Introduction===&lt;br /&gt;
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application. Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning. This, combined with the documentation produced as part of the threat modeling process, can give the reviewer a greater understanding of the system. This allows the reviewer to see where the entry points to the application are and the associated threats with each entry point. The concept of threat modeling is not new but there has been a clear mindset change in recent years. Modern threat modeling looks at a system from a potential attacker's perspective, as opposed to a defender's viewpoint. Microsoft have been strong advocates of the process over the past number of years. They have made threat modeling a core component of their SDLC, which they claim to be one of the reasons for the increased security of their products in recent years. &lt;br /&gt;
&lt;br /&gt;
When source code analysis is performed outside the SDLC, such as on existing applications, the results of the threat modeling help in reducing the complexity of the source code analysis by promoting an in-depth first approach vs. breadth first approach. Instead of reviewing all source code with equal focus, you can prioritize the security code review of components whose threat modeling has ranked with high risk threats. &lt;br /&gt;
&lt;br /&gt;
The threat modeling process can be decomposed into 3 high level steps:&lt;br /&gt;
&lt;br /&gt;
'''Step 1:''' Decompose the Application. &lt;br /&gt;
The first step in the threat modeling process is concerned with gaining an understanding of the application and how it interacts with external entities. This involves creating use-cases to understand how the application is used, identifying entry points to see where a potential attacker could interact with the application, identifying assets i.e. items/areas that the attacker would be interested in, and identifying trust levels which represent the access rights that the application will grant to external entities. This information is documented in the Threat Model document and it is also used to produce data flow diagrams (DFDs) for the application. The DFDs show the different paths through the system, highlighting the privilege boundaries. &lt;br /&gt;
&lt;br /&gt;
'''Step 2:''' Determine and rank threats.&lt;br /&gt;
Critical to the identification of threats is using a threat categorization methodology. A threat categorization such as STRIDE can be used, or the Application Security Frame (ASF) that defines threat categories such as Auditing &amp;amp; Logging, Authentication, Authorization, Configuration Management, Data Protection in Storage and Transit, Data Validation, Exception Management. The goal of the threat categorization is to help identify threats both from the attacker (STRIDE) and the defensive perspective (ASF). DFDs produced in step 1 help to identify the potential threat targets from the attacker's perspective, such as data sources, processes, data flows, and interactions with users. These threats can be identified further as the roots for threat trees; there is one tree for each threat goal. From the defensive perspective, ASF categorization helps to identify the threats as weaknesses of security controls for such threats. Common threat-lists with examples can help in the identification of such threats. Use and abuse cases can illustrate how existing protective measures could be bypassed, or where a lack of such protection exists. The determination of the security risk for each threat can be determined using a value-based risk model such as DREAD or a less subjective qualitative risk model based upon general risk factors (e.g. likelihood and impact).&lt;br /&gt;
&lt;br /&gt;
'''Step 3:''' Determine countermeasures and mitigation.&lt;br /&gt;
A lack of protection against a threat might indicate a vulnerability whose risk exposure could be mitigated with the implementation of a countermeasure. Such countermeasures can be identified using threat-countermeasure mapping lists. Once a risk ranking is assigned to the threats, it is possible to sort threats from the highest to the lowest risk, and prioritize the mitigation effort, such as by responding to such threats by applying the identified countermeasures. The risk mitigation strategy might involve evaluating these threats from the business impact that they pose and reducing  the risk. Other options might include taking the risk, assuming the business impact is acceptable because of compensating controls, informing the user of the threat, removing the risk posed by the threat completely, or the least preferable option, that is, to do nothing. &lt;br /&gt;
&lt;br /&gt;
Each of the above steps are documented as they are carried out. The resulting document is the threat model for the application. This guide will use an example to help explain the concepts behind threat modeling. The same example will be used throughout each of the 3 steps as a learning aid. The example that will be used is a college library website. At the end of the guide we will have produced the threat model for the college library website. Each of the steps in the threat modeling process are described in detail below.&lt;br /&gt;
&lt;br /&gt;
== Decompose the Application ==&lt;br /&gt;
The goal of this step is to gain an understanding of the application and how it interacts with external entities. This goal is achieved by information gathering and documentation. The information gathering process is carried out using a clearly defined structure, which ensures the correct information is collected. This structure also defines how the information should be documented to produce the Threat Model. &lt;br /&gt;
&lt;br /&gt;
==Threat Model Information==&lt;br /&gt;
The first item in the threat model is the information relating to the threat model. &lt;br /&gt;
This must include the the following:&lt;br /&gt;
&lt;br /&gt;
# '''Application Name''' - The name of the application.&lt;br /&gt;
# '''Application Version''' - The version of the application.&lt;br /&gt;
# '''Description''' - A high level description of the application.&lt;br /&gt;
# '''Document Owner''' - The owner of the threat modeling document. &lt;br /&gt;
# '''Participants''' - The participants involved in the threat modeling process for this application.&lt;br /&gt;
# '''Reviewer''' - The reviewer(s) of the threat model.&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Category:FIXME|the list above includes an Application name, but the example does not have one]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Threat Model Information&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Application Version:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.0&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt; Description:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website is the first implementation of a website to provide librarians and library patrons (students and college staff) with online services. &lt;br /&gt;
As this is the first implementation of the website, the functionality will be limited. There will be three users of the application: &amp;lt;br /&amp;gt;&lt;br /&gt;
1. Students&amp;lt;br /&amp;gt;&lt;br /&gt;
2. Staff&amp;lt;br /&amp;gt;&lt;br /&gt;
3. Librarians&amp;lt;br /&amp;gt;&lt;br /&gt;
Staff and students will be able to log in and search for books, and staff members can request books. Librarians will be able to log in, add books, add users, and search for books.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Document Owner:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;David Lowry&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Participants:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;David Rook&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th align=&amp;quot;left&amp;quot;&amp;gt;Reviewer:&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Eoin Keary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Dependencies==&lt;br /&gt;
External dependencies are items external to the code of the application that may pose a threat to the application. These items are typically still within the control of the organization, but possibly not within the control of the development team. The first area to look at when investigating external dependencies is how the application will be deployed in a production environment, and what are the requirements surrounding this. This involves looking at how the application is or is not intended to be run. For example if the application is expected to be run on a server that has been hardened to the organization's hardening standard and it is expected to sit behind a firewall, then this information should be documented in the external dependencies section. External dependencies should be documented as follows:&lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique ID assigned to the external dependency.&lt;br /&gt;
# '''Description''' - A textual description of the external dependency.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;External Dependencies&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website will run on a Linux server running Apache.  This server will be hardened as per the college's server hardening standard. This includes the application of the latest operating system and application security patches.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database server will be MySQL and it will run on a Linux server. This server will be hardened as per the college's server hardening standard. This will include the application of the lastest operating system and application security patches.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The connection between the Web Server and the database server will be over a private network.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Web Server is behind a firewall and the only communication available is TLS.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Entry Points==&lt;br /&gt;
Entry points define the interfaces through which potential attackers can interact with the application or supply it with data. In order for a potential attacker to attack an application, entry points must exist. Entry points in an application can be layered, for example each web page in a web application may contain multiple entry points. Entry points should be documented as follows: &lt;br /&gt;
&lt;br /&gt;
#  '''ID''' - A unique ID assigned to the entry point. This will be used to cross reference the entry point with any threats or vulnerabilities that are identified. In the case of layer entry points, a major.minor notation should be used.&lt;br /&gt;
# '''Name''' - A descriptive name identifying the entry point and its purpose.&lt;br /&gt;
# '''Description''' - A textual description detailing the interaction or processing that occurs at the entry point.&lt;br /&gt;
# '''Trust Levels''' - The level of access required at the entry point is documented here. These will be cross referenced with the trusts levels defined later in the document.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Entry Points&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;15%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;45%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;HTTPS Port&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The college library website will be only be accessible via TLS. All pages within the college library website are layered on this entry point.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Library Main Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The splash page for the college library website is the entry point for all users.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Students, faculty members and librarians must log in to the college library website before they can carry out any of the use cases.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;(1) Anonymous Web User&amp;lt;br /&amp;gt;&lt;br /&gt;
(2) User with Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Function&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login function accepts user supplied credentials and compares them with those in the database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(3) User with Invalid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Search Entry Page&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The page used to enter a search query.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Assets==&lt;br /&gt;
The system must have something that the attacker is interested in; these items/areas of interest are defined as assets. Assets are essentially threat targets, i.e. they are the reason threats will exist. Assets can be both physical assets and abstract assets. For example, an asset of an application might be a list of clients and their personal information; this is a physical asset. An abstract asset might be the reputation of an organization. Assets are documented in the threat model as follows: &lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique ID is assigned to identify each asset. This will be used to cross reference the asset with any threats or vulnerabilities that are identified.&lt;br /&gt;
# '''Name''' - A descriptive name that clearly identifies the asset.&lt;br /&gt;
# '''Description''' - A textual description of what the asset is and why it needs to be protected.&lt;br /&gt;
# '''Trust Levels''' - The level of access required to access the entry point is documented here. These will be cross referenced with the trust levels defined in the next step.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Assets&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;15%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;55%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Library Users and Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to students, faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User Login Details&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login credentials that a student or a faculty member will use to log into the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Librarian Login Details&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The login credentials that a Librarian will use to log into the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Personal Data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The College Library website will store personal information relating to the students, faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian &amp;lt;br /&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;System&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to the underlying system.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Availability of College Library Website&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The College Library website should be available 24 hours a day and can be accessed by all students, college faculty members, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute Code as a Web Server User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute source code on the web server as a web server user.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(6) Website Administrator &amp;lt;br /&amp;gt;&lt;br /&gt;
(7) Web Server User Process &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute SQL as a Database Read User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute SQL select queries on the database, and thus retrieve any information stored within the College Library database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
(8) Database Read User&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2.4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Execute SQL as a Database Read/Write User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the ability to execute SQL. Select, insert, and update queries on the database and thus have read and write access to any information stored within the College Library database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
(9) Database Read/Write User&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Website&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Assets relating to the College Library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Login Session&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the login session of a user to the College Library website. This user could be a student, a member of the college faculty, or a Librarian.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(2) User with Valid Login Credentials&amp;lt;br /&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to the Database Server&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to the database server allows you to administer the database, giving you full access to the database users and all data contained within the database.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(5) Database Server Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Ability to Create Users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The ability to create users would allow an individual to create new users on the system. These could be student users, faculty member users, and librarian users.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(4) Librarian&amp;lt;br /&amp;gt;&lt;br /&gt;
(6) Website Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3.4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Access to Audit Data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The audit data shows all audit-able events that occurred within the College Library application by students, staff, and librarians.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
(6) Website Administrator&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Trust Levels==&lt;br /&gt;
Trust levels represent the access rights that the application will grant to external entities. The trust levels are cross referenced with the entry points and assets. This allows us to define the access rights or privileges required at each entry point, and those required to interact with each asset. Trust levels are documented in the threat model as follows: &lt;br /&gt;
&lt;br /&gt;
# '''ID''' - A unique number is assigned to each trust level. This is used to cross reference the trust level with the entry points and assets.&lt;br /&gt;
# '''Name''' - A descriptive name that allows you to identify the external entities that have been granted this trust level.&lt;br /&gt;
# '''Description''' - A textual description of the trust level detailing the external entity who has been granted the trust level.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
Example:&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;Trust Levels&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;5%&amp;quot;&amp;gt;ID&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;25%&amp;quot;&amp;gt;Name&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th width=&amp;quot;70%&amp;quot;&amp;gt;Description&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Anonymous Web User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website but has not provided valid credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User with Valid Login Credentials&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website and has logged in using valid login credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;3&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User with Invalid Login Credentials&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;A user who has connected to the college library website and is attempting to log in using invalid login credentials.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;4&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Librarian&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The librarian can create users on the library website and view their personal information.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;5&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Server Administrator&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database server administrator has read and write access to the database that is used by the college library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;6&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Website Administrator&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The Website administrator can configure the college library website.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;7&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Web Server User Process&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;This is the process/user that the web server executes code as and authenticates itself against the database server as.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;8&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Read User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database user account used to access the database for read access.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;9&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Database Read/Write User&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;The database user account used to access the database for read and write access.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Data Flow Diagrams==&lt;br /&gt;
All of the information collected allows us to accurately model the application through the use of Data Flow Diagrams (DFDs). The DFDs will allow us to gain a better understanding of the application by providing a visual representation of how the application processes data. The focus of the DFDs is on how data moves through the application and what happens to the data as it moves. DFDs are hierarchical in structure, so they can be used to decompose the application into subsystems and lower-level subsystems. The high level DFD will allow us to clarify the scope of the application being modeled. The lower level iterations will allow us to focus on the specific processes involved when processing specific data. There are a number of symbols that are used in DFDs for threat modeling. These are described below:&lt;br /&gt;
&lt;br /&gt;
'''External Entity'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The external entity shape is used to represent any entity outside the application that interacts with the application via an entry point.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_external_entity.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Process'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The process shape represents a task that handles data within the application. The task may process the data or perform an action based on the data.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_process.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Multiple Process'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The multiple process shape is used to present a collection of subprocesses. The multiple process can be broken down into its subprocesses in another DFD.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_multiple_process.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Data Store'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The data store shape is used to represent locations where data is stored. Data stores do not modify the data, they only store data.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_data_store.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Data Flow'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The data flow shape represents data movement within the application. The direction of the data movement is represented by the arrow.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_data_flow.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
'''Privilege Boundary'''&amp;lt;br /&amp;gt;&lt;br /&gt;
The privilege boundary shape is used to represent the change of privilege levels as the data flows through the application.&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:DFD_privilge_boundary.gif]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Example===&lt;br /&gt;
&amp;lt;br /&amp;gt; '''Data Flow Diagram for the College Library Website'''&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:Data flow1.jpg]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
'''User Login Data Flow Diagram for the College Library Website'''&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:Data flow2.jpg]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Determine and Rank Threats ==&lt;br /&gt;
===Threat Categorization===&lt;br /&gt;
The first step in the determination of threats is adopting a threat categorization. A threat categorization provides a set of threat categories with corresponding examples so that threats can be systematically identified in the application in a structured and repeatable manner. &lt;br /&gt;
&lt;br /&gt;
====STRIDE====&lt;br /&gt;
A threat categorization such as STRIDE is useful in the '''&amp;lt;u&amp;gt;''classification''&amp;lt;/u&amp;gt;''' of threats by classifying attacker goals such as:&lt;br /&gt;
*Spoofing&lt;br /&gt;
*Tampering&lt;br /&gt;
*Repudiation&lt;br /&gt;
*Information Disclosure&lt;br /&gt;
*Denial of Service&lt;br /&gt;
*Elevation of Privilege.&lt;br /&gt;
&lt;br /&gt;
A threat list of generic threats organized in these categories with examples and the affected security controls is provided in the following table:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;STRIDE Threat List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Examples&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Security Control&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Spoofing&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to illegally access and use another user's credentials, such as username and password.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tampering&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to maliciously change/modify persistent data, such as persistent data in a database, and the alteration of data in transit between two computers over an open network, such as the Internet.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Integrity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Repudiation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action aimed to perform illegal operations in a system that lacks the ability to trace the prohibited operations.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Non-Repudiation&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Information disclosure&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat action to read a file that one was not granted access to, or to read data in transit. &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Confidentiality&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#dddddd&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Denial of service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat aimed to deny access to valid users, such as by making a web server temporarily unavailable or unusable. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Availability&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Elevation of privilege&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Threat aimed to gain privileged access to resources for gaining unauthorized access to information or to compromise a system.&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authorization&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Security Controls==&lt;br /&gt;
Once the basic threat agents and business impacts are understood, the review team should try to identify the set of controls that could prevent these threat agents from causing those impacts.  The primary focus of the code review should be to ensure that these security controls are in place, that they work properly, and that they are correctly invoked in all the necessary places. The checklist below can help to ensure that all the likely risks have been considered.&lt;br /&gt;
&lt;br /&gt;
'''Authentication:'''&lt;br /&gt;
*Ensure all internal and external connections (user and entity) go through an appropriate and adequate form of authentication. Be assured that this control cannot be bypassed. &lt;br /&gt;
*Ensure all pages enforce the requirement for authentication. &lt;br /&gt;
*Ensure that whenever authentication credentials or any other sensitive information is passed, only accept the information via the HTTP “POST” method and will not accept it via the HTTP “GET” method. &lt;br /&gt;
*Any page deemed by the business or the development team as being outside the scope of authentication should be reviewed in order to assess any possibility of security breach. &lt;br /&gt;
*Ensure that authentication credentials do not traverse the wire in clear text form. &lt;br /&gt;
*Ensure development/debug backdoors are not present in production code. &lt;br /&gt;
&lt;br /&gt;
'''Authorization: '''&lt;br /&gt;
*Ensure that there are authorization mechanisms in place. &lt;br /&gt;
*Ensure that the application has clearly defined the user types and the rights of said users. &lt;br /&gt;
*Ensure there is a least privilege stance in operation. &lt;br /&gt;
*Ensure that the Authorization mechanisms work properly, fail securely, and cannot be circumvented. &lt;br /&gt;
*Ensure that authorization is checked on every request. &lt;br /&gt;
*Ensure development/debug backdoors are not present in production code. &lt;br /&gt;
&lt;br /&gt;
'''Cookie Management: '''&lt;br /&gt;
*Ensure that sensitive information is not comprised. &lt;br /&gt;
*Ensure that unauthorized activities cannot take place via cookie manipulation. &lt;br /&gt;
*Ensure that proper encryption is in use. &lt;br /&gt;
*Ensure secure flag is set to prevent accidental transmission over “the wire” in a non-secure manner. &lt;br /&gt;
*Determine if all state transitions in the application code properly check for the cookies and enforce their use. &lt;br /&gt;
*Ensure the session data is being validated. &lt;br /&gt;
*Ensure cookies contain as little private information as possible. &lt;br /&gt;
*Ensure entire cookie is encrypted if sensitive data is persisted in the cookie. &lt;br /&gt;
*Define all cookies being used by the application, their name, and why they are needed. &lt;br /&gt;
&lt;br /&gt;
'''Data/Input Validation: '''&lt;br /&gt;
*Ensure that a DV mechanism is present. &lt;br /&gt;
*Ensure all input that can (and will) be modified by a malicious user such as HTTP headers, input fields, hidden fields, drop down lists, and other web components are properly validated. &lt;br /&gt;
*Ensure that the proper length checks on all input exist. &lt;br /&gt;
*Ensure that all fields, cookies, http headers/bodies, and form fields are validated. &lt;br /&gt;
*Ensure that the data is well formed and contains only known good chars if possible. &lt;br /&gt;
*Ensure that the data validation occurs on the server side. &lt;br /&gt;
*Examine where data validation occurs and if a centralized model or decentralized model is used. &lt;br /&gt;
*Ensure there are no backdoors in the data validation model. &lt;br /&gt;
*'''Golden Rule: All external input, no matter what it is, is examined and validated. '''&lt;br /&gt;
&lt;br /&gt;
'''Error Handling/Information leakage: '''&lt;br /&gt;
*Ensure that all method/function calls that return a value have proper error handling and return value checking. &lt;br /&gt;
*Ensure that exceptions and error conditions are properly handled. &lt;br /&gt;
*Ensure that no system errors can be returned to the user. &lt;br /&gt;
*Ensure that the application fails in a secure manner. &lt;br /&gt;
*Ensure resources are released if an error occurs. &lt;br /&gt;
&lt;br /&gt;
'''Logging/Auditing: '''&lt;br /&gt;
*Ensure that no sensitive information is logged in the event of an error. &lt;br /&gt;
*Ensure the payload being logged is of a defined maximum length and that the logging mechanism enforces that length. &lt;br /&gt;
*Ensure no sensitive data can be logged; e.g. cookies, HTTP “GET” method, authentication credentials. &lt;br /&gt;
*Examine if the application will audit the actions being taken by the application on behalf of the client (particularly data manipulation/Create, Update, Delete (CUD) operations). &lt;br /&gt;
*Ensure successful and unsuccessful authentication is logged. &lt;br /&gt;
*Ensure application errors are logged. &lt;br /&gt;
*Examine the application for debug logging with the view to logging of sensitive data. &lt;br /&gt;
&lt;br /&gt;
'''Cryptography: '''&lt;br /&gt;
*Ensure no sensitive data is transmitted in the clear, internally or externally. &lt;br /&gt;
*Ensure the application is implementing known good cryptographic methods. &lt;br /&gt;
&lt;br /&gt;
'''Secure Code Environment: '''&lt;br /&gt;
*Examine the file structure. Are any components that should not be directly accessible available to the user?&lt;br /&gt;
*Examine all memory allocations/de-allocations. &lt;br /&gt;
*Examine the application for dynamic SQL and determine if it is vulnerable to injection. &lt;br /&gt;
*Examine the application for “main()” executable functions and debug harnesses/backdoors.&lt;br /&gt;
*Search for commented out code, commented out test code, which may contain sensitive information. &lt;br /&gt;
*Ensure all logical decisions have a default clause. &lt;br /&gt;
*Ensure no development environment kit is contained on the build directories. &lt;br /&gt;
*Search for any calls to the underlying operating system or file open calls and examine the error possibilities. &lt;br /&gt;
&lt;br /&gt;
'''Session Management: '''&lt;br /&gt;
*Examine how and when a session is created for a user, unauthenticated and authenticated. &lt;br /&gt;
*Examine the session ID and verify if it is complex enough to fulfill requirements regarding strength. &lt;br /&gt;
*Examine how sessions are stored: e.g. in a database, in memory etc. &lt;br /&gt;
*Examine how the application tracks sessions. &lt;br /&gt;
*Determine the actions the application takes if an invalid session ID occurs. &lt;br /&gt;
*Examine session invalidation. &lt;br /&gt;
*Determine how multithreaded/multi-user session management is performed. &lt;br /&gt;
*Determine the session HTTP inactivity timeout. &lt;br /&gt;
*Determine how the log-out functionality functions.&lt;br /&gt;
&lt;br /&gt;
==Threat Analysis==&lt;br /&gt;
The prerequisite in the analysis of threats is the understanding of the generic definition of risk that is the probability that a threat agent will exploit a vulnerability to cause an impact to the application. From the perspective of risk management, threat modeling is the systematic and strategic approach for identifying and enumerating threats to an application environment with the objective of minimizing risk and the associated impacts. &lt;br /&gt;
&lt;br /&gt;
Threat analysis as such is the identification of the threats to the application, and involves the analysis of each aspect of the application functionality and architecture and design to identify and classify potential weaknesses that could lead to an exploit. &lt;br /&gt;
&lt;br /&gt;
In the first threat modeling step, we have modeled the system showing data flows, trust boundaries, process components, and entry and exit points. An example of such modeling is shown in the Example: Data Flow Diagram for the College Library Website. &lt;br /&gt;
&lt;br /&gt;
Data flows show how data flows logically through the end to end, and allows the identification of affected components through critical points (i.e. data entering or leaving the system, storage of data) and the flow of control through these components. Trust boundaries show any location where the level of trust changes. Process components show where data is processed, such as web servers, application servers, and database servers. Entry points show where data enters the system (i.e. input fields, methods) and exit points are where it leaves the system (i.e. dynamic output, methods), respectively. Entry and exit points define a trust boundary. &lt;br /&gt;
&lt;br /&gt;
Threat lists based on the STRIDE model are useful in the identification of threats with regards to the attacker goals. For example, if the threat scenario is attacking the login, would the attacker brute force the password to break the authentication? If the threat scenario is to try to elevate privileges to gain another user’s privileges, would the attacker try to perform forceful browsing? &lt;br /&gt;
&lt;br /&gt;
It is vital that all possible attack vectors should be evaluated from the attacker’s point of view. For this reason, it is also important to consider entry and exit points, since they could also allow the realization of certain kinds of threats. For example, the login page allows sending authentication credentials, and the input data accepted by an entry point has to validate for potential malicious input to exploit vulnerabilities such as SQL injection, cross site scripting, and buffer overflows. Additionally, the data flow passing through that point has to be used to determine the threats to the entry points to the next components along the flow. If the following components can be regarded critical (e.g. the hold sensitive data), that entry point can be regarded more critical as well. In an end to end data flow, for example, the input data (i.e. username and password) from a login page, passed on without validation,  could be exploited for a SQL injection attack to manipulate a query for breaking the authentication or to modify a table in the database. &lt;br /&gt;
&lt;br /&gt;
Exit points might serve as attack points to the client (e.g. XSS vulnerabilities) as well for the realization of information disclosure vulnerabilities. For example, in the case of exit points from components handling confidential data (e.g. data access components), exit points lacking security controls to protect the confidentiality and integrity can lead to disclosure of such confidential information to an unauthorized user. &lt;br /&gt;
&lt;br /&gt;
In many cases threats enabled by exit points are related to the threats of the corresponding entry point. In the login example, error messages returned to the user via the exit point might allow for entry point attacks, such as account harvesting (e.g. username not found), or SQL injection (e.g. SQL exception errors). &lt;br /&gt;
&lt;br /&gt;
From the defensive perspective, the identification of threats driven by security control categorization such as ASF, allows a threat analyst to focus on specific issues related to weaknesses (e.g. vulnerabilities) in security controls. Typically the process of threat identification involves going through iterative cycles where initially all the possible threats in the threat list that apply to each component are evaluated. &lt;br /&gt;
&lt;br /&gt;
At the next iteration, threats are further analyzed by exploring the attack paths, the root causes (e.g. vulnerabilities, depicted as orange blocks) for the threat to be exploited, and the necessary mitigation controls (e.g. countermeasures, depicted as green blocks). A threat tree as shown in figure 2 is useful to perform such threat analysis &lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Graph.gif|Figure 2: Threat Graph]]&lt;br /&gt;
&lt;br /&gt;
Once common threats, vulnerabilities, and attacks are assessed, a more focused threat analysis should take in consideration use and abuse cases. By thoroughly analyzing the use scenarios, weaknesses can be identified that could lead to the realization of a threat. Abuse cases should be identified as part of the security requirement engineering activity. These abuse cases can illustrate how existing protective measures could be bypassed, or where a lack of such protection exists. A use and misuse case graph for authentication is shown in figure below:&lt;br /&gt;
&lt;br /&gt;
[[Image:UseAndMisuseCase.jpg|640px|Figure 3: Use and Misuse Case]]&lt;br /&gt;
&lt;br /&gt;
Finally, it is possible to bring all of this together by determining the types of threat to each component of the decomposed system. This can be done by using a threat categorization such as STRIDE or ASF, the use of threat trees to determine how the threat can be exposed by a vulnerability, and use and misuse cases to further validate the lack of a countermeasure to mitigate the threat.&lt;br /&gt;
&lt;br /&gt;
To apply STRIDE to the data flow diagram items the following table can be used: &lt;br /&gt;
&lt;br /&gt;
TABLE&lt;br /&gt;
&lt;br /&gt;
==Ranking of Threats==&lt;br /&gt;
Threats can be ranked from the perspective of various factors, all depending on the approach and methodology applied.  A '''risk centric''' threat model such as PASTA (Process for Attack Simulation &amp;amp; Threat Analysis) focuses on prioritization based upon risks to the product, information owners, business or other stakeholders.  A '''security centric''' approach may rank threats based upon ease of exploitation, technical impact to the product or application.  A software centric approach may prioritize threats based upon the adverse effects they may have against functional use cases and software features.  The largest different amongst the three approaches (and thereby) ranking of threats is largely based upon goals of each approach.  PASTA is focused on addressing the most likely and most impacting to the business.  Security centric is focused on threat coverage, and ranking based upon more technical impact levels and ease of exploitation.  Software centric ranking efforts will be driven by threats that affect code quality or functional use of application use cases.  &lt;br /&gt;
&lt;br /&gt;
Generic risk models can also be applied to the security and software centric approaches in order to create a prioritized list of threats to support a risk mitigation strategy, such as deciding on which threats have to be mitigated first. Generic risk factors can be used to determine which threats can be ranked as High, Medium, or Low risk. In general, threat risk models use different factors to model risks such as those shown in figure below:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Riskfactors.JPG|Figure 3: Risk Model Factors]]&lt;br /&gt;
&lt;br /&gt;
This generic risk based approach differs from PASTA in that it doesn't leverage threat data (actual events) or threat intelligence to provide an evidence based approach to the risk analysis.  A generic risk based approach can often be quicker since this type of data may be difficult to obtain. A generic based approach is more qualitative and speculative in nature as well, which again makes it quicker to apply, but less evidence based compared to PASTA.  &lt;br /&gt;
&lt;br /&gt;
==DREAD ==&lt;br /&gt;
DREAD is a risk calculation model developed by Microsoft.  It is intended to simply rate risks based upon the following characteristics.  It is NOT a methodology for threat modeling.  The context on how the below mentioned should be applied as a rating should be based upon the bolded content below: &lt;br /&gt;
* '''D'''amage potential: How great is the '''damage''' '''if''' the '''vulnerability''' is '''exploited'''?&lt;br /&gt;
* '''R'''eproducibility: How easy is it to '''reproduce''' the attack?&lt;br /&gt;
* '''E'''xploitability: How easy is it to '''launch''' an attack?&lt;br /&gt;
* '''A'''ffected users: As a rough percentage, how many '''users''' are affected?&lt;br /&gt;
* '''D'''iscoverability: How easy is it to '''find the vulnerability'''?&lt;br /&gt;
'''Thread Rating Table (''Source:''''' https://msdn.microsoft.com/en-us/library/ff648644.aspx) &lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
!&lt;br /&gt;
!Rating&lt;br /&gt;
!High (3)&lt;br /&gt;
!Medium (2)&lt;br /&gt;
!Low (1)&lt;br /&gt;
|-&lt;br /&gt;
|D&lt;br /&gt;
|Damage potential&lt;br /&gt;
|The attacker can subvert the security system; get full trust authorization; run as administrator; upload content.&lt;br /&gt;
|Leaking sensitive information&lt;br /&gt;
|Leaking trivial information&lt;br /&gt;
|-&lt;br /&gt;
|R&lt;br /&gt;
|Reproducibility&lt;br /&gt;
|The attack can be reproduced every time and does not require a timing window.&lt;br /&gt;
|The attack can be reproduced, but only with a timing window and a particular race situation.&lt;br /&gt;
|The attack is very difficult to reproduce, even with knowledge of the security hole.&lt;br /&gt;
|-&lt;br /&gt;
|E&lt;br /&gt;
|Exploitability&lt;br /&gt;
|A novice programmer could make the attack in a short time.&lt;br /&gt;
|A skilled programmer could make the attack, then repeat the steps.&lt;br /&gt;
|The attack requires an extremely skilled person and in-depth knowledge every time to exploit.&lt;br /&gt;
|-&lt;br /&gt;
|A&lt;br /&gt;
|Affected users&lt;br /&gt;
|All users, default configuration, key customers&lt;br /&gt;
|Some users, non-default configuration&lt;br /&gt;
|Very small percentage of users, obscure feature; affects anonymous users&lt;br /&gt;
|-&lt;br /&gt;
|D&lt;br /&gt;
|Discoverability&lt;br /&gt;
|Published information explains the attack. The vulnerability is found in the most commonly used feature and is very noticeable.&lt;br /&gt;
|The vulnerability is in a seldom-used part of the product, and only a few users should come across it. It would take some thinking to see malicious use.&lt;br /&gt;
|The bug is obscure, and it is unlikely that users will work out damage potential.&lt;br /&gt;
|}&lt;br /&gt;
After you ask the above questions, count the values (1 to 3) for a given threat. The result can fall in the range of 5 to 15. Then you can treat threats with overall ratings of 12 to 15 as High risk, 8 to 11 as Medium risk, and 5 to 7 as Low risk.&lt;br /&gt;
&lt;br /&gt;
==Generic Risk Model==&lt;br /&gt;
A more generic risk model takes into consideration the Likelihood (e.g. probability of an attack) and the Impact (e.g. damage potential): &lt;br /&gt;
&lt;br /&gt;
'''Risk = Likelihood x Impact'''&lt;br /&gt;
&lt;br /&gt;
The likelihood or probability is defined by the ease of exploitation, which mainly depends on the type of threat and the system characteristics, and by the possibility to realize a threat, which is determined by the existence of an appropriate countermeasure.  &lt;br /&gt;
&lt;br /&gt;
The following is a set of considerations for determining ease of exploitation: &lt;br /&gt;
# Can an attacker exploit this remotely? &lt;br /&gt;
# Does the attacker need to be authenticated?&lt;br /&gt;
# Can the exploit be automated?&lt;br /&gt;
&lt;br /&gt;
The impact mainly depends on the damage potential and the extent of the impact, such as the number of components that are affected by a threat. &lt;br /&gt;
&lt;br /&gt;
Examples to determine the damage potential are:&lt;br /&gt;
# Can an attacker completely take over and manipulate the system?  &lt;br /&gt;
# Can an attacker gain administration access to the system?&lt;br /&gt;
# Can an attacker crash the system? &lt;br /&gt;
# Can the attacker obtain access to sensitive information such as secrets, PII&lt;br /&gt;
&lt;br /&gt;
Examples to determine the number of components that are affected by a threat:&lt;br /&gt;
# How many data sources and systems can be impacted?&lt;br /&gt;
# How “deep” into the infrastructure can the threat agent go?&lt;br /&gt;
&lt;br /&gt;
These examples help in the calculation of the overall risk values by assigning qualitative values such as High, Medium and Low to Likelihood and Impact factors. In this case, using qualitative values, rather than numeric ones like in the case of the DREAD model, help avoid the ranking becoming overly subjective.&lt;br /&gt;
&lt;br /&gt;
==Countermeasure Identification==&lt;br /&gt;
The purpose of the countermeasure identification is to determine if there is some kind of protective measure (e.g. security control, policy measures) in place that can prevent each threat previously identified via threat analysis from being realized. Vulnerabilities are then those threats that have no countermeasures. Since each of these threats has been categorized either with STRIDE or ASF, it is possible to find appropriate countermeasures in the application within the given category. &lt;br /&gt;
&lt;br /&gt;
Provided below is a brief and limited checklist which is by no means an exhaustive list for identifying countermeasures for specific threats. &lt;br /&gt;
 &lt;br /&gt;
Example of countermeasures for ASF threat types are included in the following table: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;ASF Threat &amp;amp; Countermeasures List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Threat Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Countermeasure&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authentication&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Credentials and authentication tokens are protected with encryption in storage and transit&lt;br /&gt;
#Protocols are resistant to brute force, dictionary, and replay attacks&lt;br /&gt;
#Strong password policies are enforced&lt;br /&gt;
#Trusted server authentication is used instead of SQL authentication&lt;br /&gt;
#Passwords are stored with salted hashes&lt;br /&gt;
#Password resets do not reveal password hints and valid usernames&lt;br /&gt;
#Account lockouts do not result in a denial of service attack&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Authorization&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Strong ACLs are used for enforcing authorized access to resources&lt;br /&gt;
#Role-based access controls are used to restrict access to specific operations&lt;br /&gt;
#The system follows the principle of least privilege for user and service accounts&lt;br /&gt;
#Privilege separation is correctly configured within the presentation, business and data access layers&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Configuration Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Least privileged processes are used and service accounts with no administration capability&lt;br /&gt;
#Auditing and logging of all administration activities is enabled&lt;br /&gt;
#Access to configuration files and administrator interfaces is restricted to administrators&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Data Protection in Storage and Transit&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Standard encryption algorithms and correct key sizes are being used&lt;br /&gt;
#Hashed message authentication codes (HMACs) are used to protect data integrity&lt;br /&gt;
#Secrets (e.g. keys, confidential data ) are cryptographically protected both in transport and in storage&lt;br /&gt;
#Built-in secure storage is used for protecting keys&lt;br /&gt;
#No credentials and sensitive data are sent in clear text over the wire&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Data Validation / Parameter Validation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Data type, format, length, and range checks are enforced&lt;br /&gt;
#All data sent from the client is validated&lt;br /&gt;
#No security decision is based upon parameters (e.g. URL parameters) that can be manipulated&lt;br /&gt;
#Input filtering via white list validation is used&lt;br /&gt;
#Output encoding is used&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Error Handling and Exception Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#All exceptions are handled in a structured manner&lt;br /&gt;
#Privileges are restored to the appropriate level in case of errors and exceptions&lt;br /&gt;
#Error messages are scrubbed so that no sensitive information is revealed to the attacker&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;User and Session Management&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#No sensitive information is stored in clear text in the cookie&lt;br /&gt;
#The contents of the authentication cookies is encrypted&lt;br /&gt;
#Cookies are configured to expire&lt;br /&gt;
#Sessions are resistant to replay attacks&lt;br /&gt;
#Secure communication channels are used to protect authentication cookies&lt;br /&gt;
#User is forced to re-authenticate when performing critical functions&lt;br /&gt;
#Sessions are expired at logout&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Auditing and Logging&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Sensitive information (e.g. passwords, PII) is not logged&lt;br /&gt;
#Access controls (e.g. ACLs) are enforced on log files to prevent un-authorized access&lt;br /&gt;
#Integrity controls (e.g. signatures) are enforced on log files to provide non-repudiation&lt;br /&gt;
#Log files provide for audit trail for sensitive operations and logging of key events&lt;br /&gt;
#Auditing and logging is enabled across the tiers on multiple servers&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
When using STRIDE, the following threat-mitigation table can be used to identify techniques that can be employed to mitigate the threats.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;7&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;STRIDE Threat &amp;amp; Mitigation Techniques List&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Threat Type&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Mitigation Techniques&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Spoofing Identity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authentication&lt;br /&gt;
#Protect secret data&lt;br /&gt;
#Don't store secrets&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Tampering with data&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authorization&lt;br /&gt;
#Hashes&lt;br /&gt;
#MACs&lt;br /&gt;
#Digital signatures&lt;br /&gt;
#Tamper resistant protocols&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Repudiation&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Digital signatures&lt;br /&gt;
#Timestamps&lt;br /&gt;
#Audit trails&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Information Disclosure&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Authorization&lt;br /&gt;
#Privacy-enhanced protocols&lt;br /&gt;
#Encryption&lt;br /&gt;
#Protect secrets&lt;br /&gt;
#Don't store secrets&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Denial of Service&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Appropriate authentication&lt;br /&gt;
#Appropriate authorization&lt;br /&gt;
#Filtering&lt;br /&gt;
#Throttling&lt;br /&gt;
#Quality of service&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr bgcolor=&amp;quot;#cccccc&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Elevation of privilege&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;&lt;br /&gt;
#Run with least privilege&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Once threats and corresponding countermeasures are identified it is possible to derive a threat profile with the following criteria:&lt;br /&gt;
&lt;br /&gt;
# '''Non mitigated threats:''' Threats which have no countermeasures and represent vulnerabilities that can be fully exploited and cause an impact &lt;br /&gt;
# '''Partially mitigated threats:''' Threats partially mitigated by one or more countermeasures which represent vulnerabilities that can only partially be exploited and cause a limited impact &lt;br /&gt;
# '''Fully mitigated threats:''' These threats have appropriate countermeasures in place and do not expose vulnerability and cause impact&lt;br /&gt;
&lt;br /&gt;
===Mitigation Strategies===&lt;br /&gt;
The objective of risk management is to reduce the impact that the exploitation of a threat can have to the application. This can be done by responding to a threat with a risk mitigation strategy. In general there are five options to mitigate threats &lt;br /&gt;
# '''Do nothing:''' for example, hoping for the best&lt;br /&gt;
# '''Inform about the risk:''' for example, warning user population about the risk&lt;br /&gt;
# '''Mitigate the risk:''' for example, by putting countermeasures in place&lt;br /&gt;
# '''Accept the risk:''' for example, after evaluating the impact of the exploitation (business impact)&lt;br /&gt;
# '''Transfer the risk:''' for example, through contractual agreements and insurance&lt;br /&gt;
# '''Terminate the risk:''' for example, shutdown, turn-off, unplug or decommission the asset&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The decision of which strategy is most appropriate depends on the impact an exploitation of a threat can have, the likelihood of its occurrence, and the costs for transferring (i.e. costs for insurance) or avoiding (i.e. costs or losses due redesign) it. That is, such decision is based on the risk a threat poses to the system. Therefore, the chosen strategy does not mitigate the threat itself but the risk it poses to the system. Ultimately the overall risk has to take into account the business impact, since this is a critical factor for the business risk management strategy. One strategy could be to fix only the vulnerabilities for which the cost to fix is less than the potential business impact derived by the exploitation of the vulnerability. Another strategy could be to accept the risk when the loss of some security controls (e.g. Confidentiality, Integrity, and Availability) implies a small degradation of the service, and not a loss of a critical business function. In some cases, transfer of the risk to another service provider might also be an option. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
[[Category:Threat_Modeling]]&lt;br /&gt;
[[Category:SAMM-TA-1]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Threat_Risk_Modeling&amp;diff=225484</id>
		<title>Threat Risk Modeling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Threat_Risk_Modeling&amp;diff=225484"/>
				<updated>2017-01-23T19:07:56Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Threat Risk Modeling */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
When you start a web application design, it is essential to apply threat modeling; otherwise you will squander resources, time, and money on useless controls that fail to focus on the real threats.  There are multiple approaches to threat modeling, as listed below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; Software centric threat modeling&lt;br /&gt;
&amp;lt;li&amp;gt; Security centric threat modeling&lt;br /&gt;
&amp;lt;li&amp;gt; Asset or risk centric threat modeling.  &lt;br /&gt;
&lt;br /&gt;
Below represents a mixture of Threat Modeling tools and industry references.&lt;br /&gt;
&lt;br /&gt;
The method used to assess risk is not nearly as important as actually performing a structured threat risk modeling. Microsoft notes that the single most important factor in their security improvement program was the corporate adoption of threat risk modeling.&lt;br /&gt;
&lt;br /&gt;
One of many considerations is Microsoft’s threat modeling process. It is simple to adopt by designers, developers, code reviewers, and the quality assurance team.&lt;br /&gt;
&lt;br /&gt;
The following sections provide some overview information (or see Section 6.9, Further Reading, for additional resources).&lt;br /&gt;
&lt;br /&gt;
== Threat Risk Modeling ==&lt;br /&gt;
Threat risk modeling is an essential process for secure web application development. It allows organizations to determine the correct controls and to produce effective countermeasures within budget. For example, there is little point in spending $100,000 for fraud control for a system that has negligible fraud risk.&lt;br /&gt;
&lt;br /&gt;
== Performing threat risk modeling using the Microsoft Threat Modeling Process == //OLD - need to replace this as these steps do not factor in Impact or probabilistic threat scenarios. R=Tp * Vp * I&lt;br /&gt;
&lt;br /&gt;
The threat risk modeling process has five steps, enumerated below and shown graphically in Figure 1. They are:&lt;br /&gt;
# Identify Security Objectives&lt;br /&gt;
# Survey the Application&lt;br /&gt;
# Decompose it&lt;br /&gt;
# Identify Threats&lt;br /&gt;
# Identify Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Model_Flow.gif|Figure 1: Threat Model Flow]]&lt;br /&gt;
&lt;br /&gt;
Let’s consider the steps in more detail.&lt;br /&gt;
&lt;br /&gt;
=== Identify Security Objectives ===&lt;br /&gt;
The business (or project management) leadership, in concert with the software development and quality assurance teams, all need to understand the security objectives. To facilitate this, start by breaking down the application’s security objectives into the following categories:&lt;br /&gt;
&lt;br /&gt;
* '''Identity:''' Does the application protect user identity from abuse? Are there adequate controls in place to ensure evidence of identity (as required for many banking applications?)&lt;br /&gt;
* '''Financial:''' Assess the level of risk the organization is prepared to absorb in remediation, as a potential financial loss. For example, forum software may have a lower estimated financial risk than an Internet banking application.&lt;br /&gt;
* '''Reputation:''' Quantify or estimate of the loss of reputation derived from the application being misused or successfully attacked.&lt;br /&gt;
* '''Privacy and Regulatory:''' To what extent will the application have to protect user data? Forum software by its nature is public, but a tax preparation application is subject to tax regulations and privacy legislation requirements in most countries.&lt;br /&gt;
* '''Availability Guarantees:''' Is the application required to be available per a '''''Service Level Agreement (SLA)''''' or similar guarantee? Is it a nationally protected infrastructure? To what level will the application have to be available? High availability techniques are significantly more expensive, so applying the correct controls up front will save a great deal of time, resources, and money.&lt;br /&gt;
&lt;br /&gt;
This is by no means an exhaustive list, but it gives an idea of some of the business risk decisions leading into selecting and building security controls.&lt;br /&gt;
&lt;br /&gt;
Other sources of risk guidance come from:&lt;br /&gt;
* Laws (such as privacy or finance laws)&lt;br /&gt;
* Regulations (such as banking or e-commerce regulations)&lt;br /&gt;
* Standards (such as ISO 17799)&lt;br /&gt;
* Legal Agreements (such as payment card industry standards or merchant agreements)&lt;br /&gt;
* Corporate Information Security Policy&lt;br /&gt;
&lt;br /&gt;
=== Application Overview ===&lt;br /&gt;
Once the security objectives have been defined, analyze the application design to identify the '''''components''''', '''''data flows''''', and '''''trust boundaries'''''.&lt;br /&gt;
&lt;br /&gt;
Do this by surveying the application’s architecture and design documentation. In particular, look for UML component diagrams. Such high level component diagrams are generally sufficient to understand how and why data flows to various places. For example, data movement across a trust boundary (such as from the Internet to the web tier, or from the business logic to the database server), needs to be carefully analyzed, whereas data that flows within the same trust level does not need as much scrutiny.&lt;br /&gt;
&lt;br /&gt;
=== Decompose Application ===&lt;br /&gt;
Once the application architecture is understood then decompose it further, to identify the features and modules with a security impact that need to be evaluated. For example, when investigating the authentication module, it is necessary to understand how data enters the module, how the module validates and processes the data, where the data flows, how the data is stored, and what fundamental decisions and assumptions are made by the module.&lt;br /&gt;
&lt;br /&gt;
=== Identify Threats ===&lt;br /&gt;
It is impossible to write down unknown threats, but it is likewise unlikely that new malware will be created to exploit new vulnerabilities within custom systems. Therefore, concentrate on known risks, which can be easily demonstrated using tools or techniques from Bugtraq.&lt;br /&gt;
&lt;br /&gt;
Microsoft suggests two different approaches for writing up threats. One is a threat graph, as shown in Figure 2, and the other is a structured list. &amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:FIXME|Change 3rd orange box in graphic to &amp;quot;Authorization MAY fail&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Graph.gif|Figure 2: Threat Graph]]&lt;br /&gt;
&lt;br /&gt;
Typically, a threat graph imparts more information quickly but it takes longer to construct, while a structured list is easier to create but it will take longer for the threat impacts to become obvious.&lt;br /&gt;
&lt;br /&gt;
# Attacker may be able to read other user’s messages&lt;br /&gt;
# User may not have logged off on a shared PC&lt;br /&gt;
# Data validation may allow SQL injection&lt;br /&gt;
# Implement data validation&lt;br /&gt;
# Authorization may fail, allowing unauthorized access&lt;br /&gt;
# Implement authorization checks&lt;br /&gt;
# Browser cache may contain contents of message&lt;br /&gt;
# Implement anti-caching directive in HTTP headers&lt;br /&gt;
# If eavesdropping risk is high, use SSL&lt;br /&gt;
&lt;br /&gt;
Note that it takes a motivated attacker to exploit a threat; they generally want something from your application or to obviate controls. To understand the relevant threats, use the following categories to understand who might attack the application:&lt;br /&gt;
&lt;br /&gt;
* '''Accidental Discovery:''' An ordinary user stumbles across a functional mistake in your application, just using a web browser, and gains access to privileged information or functionality.&lt;br /&gt;
* '''Automated Malware:''' Programs or scripts, which are searching for known vulnerabilities, and then report them back to a central collection site.&lt;br /&gt;
* '''The Curious Attacker:''' a security researcher or ordinary user, who notices something wrong with the application, and decides to pursue further.&lt;br /&gt;
* '''Script Kiddies:''' Common renegades, seeking to compromise or deface applications for collateral gain, notoriety, or a political agenda, perhaps using the attack categories described in the ''OWASP Web Application Penetration Checklist.''&lt;br /&gt;
* '''The Motivated Attacker:''' Potentially, a disgruntled staff member with inside knowledge or a paid professional attacker.&lt;br /&gt;
* '''Organized Crime:''' Criminals seeking high stake payouts, such as cracking e-commerce or corporate banking applications, for financial gain.&lt;br /&gt;
&lt;br /&gt;
It is vital to understand the level of attacker you are defending against. For example, a motivated attacker, who understands your internal processes is often more dangerous than script kiddies.&lt;br /&gt;
&lt;br /&gt;
=== STRIDE ===&lt;br /&gt;
STRIDE is a classification scheme for characterizing known threats according to the kinds of exploit that are used (or motivation of the attacker). The STRIDE acronym is formed from the first letter of each of the following categories.&lt;br /&gt;
&lt;br /&gt;
'''''Spoofing Identity'''''&lt;br /&gt;
“Identity spoofing” is a key risk for applications that have many users but provide a single execution context at the application and database level. In particular, users should not be able to become any other user or assume the attributes of another user.&lt;br /&gt;
&lt;br /&gt;
'''''Tampering with Data'''''&lt;br /&gt;
Users can potentially change data delivered to them, return it, and thereby potentially manipulate client-side validation, GET and POST results, cookies, HTTP headers, and so forth. The application should not send data to the user, such as interest rates or periods, which are obtainable only from within the application itself. The application should also carefully check data received from the user and validate that it is sane and applicable before storing or using it.&lt;br /&gt;
&lt;br /&gt;
'''''Repudiation'''''&lt;br /&gt;
Users may dispute transactions if there is insufficient auditing or recordkeeping of their activity. For example, if a user says, “But I didn’t transfer any money to this external account!”, and you cannot track his/her activities through the application, then it is extremely likely that the transaction will have to be written off as a loss.&lt;br /&gt;
&lt;br /&gt;
Therefore, consider if the application requires non-repudiation controls, such as web access logs, audit trails at each tier, or the same user context from top to bottom. Preferably, the application should run with the user’s privileges, not more, but this may not be possible with many off-the-shelf application frameworks.&lt;br /&gt;
&lt;br /&gt;
'''''Information Disclosure'''''&lt;br /&gt;
Users are rightfully wary of submitting private details to a system. If it is possible for an attacker to publicly reveal user data at large, whether anonymously or as an authorized user, there will be an immediate loss of confidence and a substantial period of reputation loss. Therefore, applications must include strong controls to prevent user ID tampering and abuse, particularly if they use a single context to run the entire application. &lt;br /&gt;
&lt;br /&gt;
Also, consider if the user’s web browser may leak information. Some web browsers may ignore the no caching directives in HTTP headers or handle them incorrectly. In a corresponding fashion, every secure application has a responsibility to minimize the amount of information stored by the web browser, just in case it leaks or leaves information behind, which can be used by an attacker to learn details about the application, the user, or to potentially become that user.&lt;br /&gt;
&lt;br /&gt;
Finally, in implementing persistent values, keep in mind that the use of hidden fields is insecure by nature. Such storage should not be relied on to secure sensitive information or to provide adequate personal privacy safeguards.&lt;br /&gt;
&lt;br /&gt;
'''''Denial of Service'''''&lt;br /&gt;
Application designers should be aware that their applications may be subject to a denial of service attack. Therefore, the use of expensive resources such as large files, complex calculations, heavy-duty searches, or long queries should be reserved for authenticated and authorized users, and not available to anonymous users.&lt;br /&gt;
&lt;br /&gt;
For applications that do not have this luxury, every facet of the application should be engineered to perform as little work as possible, to use fast and few database queries, to avoid exposing large files or unique links per user, in order to prevent simple denial of service attacks.&lt;br /&gt;
&lt;br /&gt;
'''''Elevation of Privilege'''''&lt;br /&gt;
If an application provides distinct user and administrative roles, then it is vital to ensure that the user cannot elevate his/her role to a higher privilege one. In particular, simply not displaying privileged role links is insufficient. Instead, all actions should be gated through an authorization matrix, to ensure that only the permitted roles can access privileged functionality.&lt;br /&gt;
&lt;br /&gt;
=== DREAD ===&lt;br /&gt;
DREAD is a classification scheme for quantifying, comparing and prioritizing the amount of risk presented by each evaluated threat.  The DREAD acronym is formed from the first letter of each category below.&lt;br /&gt;
&lt;br /&gt;
DREAD modeling influences the thinking behind setting the risk rating, and is also used directly to sort the risks. The DREAD algorithm, shown below, is used to compute a risk value, which is an average of all five categories.&lt;br /&gt;
&lt;br /&gt;
'''Risk_DREAD''' = (&amp;lt;u&amp;gt;D&amp;lt;/u&amp;gt;AMAGE + &amp;lt;u&amp;gt;R&amp;lt;/u&amp;gt;EPRODUCIBILITY + &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;XPLOITABILITY + &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;FFECTED USERS + &amp;lt;u&amp;gt;D&amp;lt;/u&amp;gt;ISCOVERABILITY) / 5&lt;br /&gt;
&lt;br /&gt;
The calculation always produces a number between 0 and 10; the higher the number, the more serious the risk.&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how to quantify the DREAD categories.&lt;br /&gt;
&lt;br /&gt;
'''''Damage Potential'''''&lt;br /&gt;
* If a threat exploit occurs, how much damage will be caused?&lt;br /&gt;
**0 = Nothing	&lt;br /&gt;
**5 = Individual user data is compromised or affected.	&lt;br /&gt;
**10 = Complete system or data destruction&lt;br /&gt;
&lt;br /&gt;
'''''Reproducibility'''''&lt;br /&gt;
* How easy is it to reproduce the threat exploit?&lt;br /&gt;
**0 = Very hard or impossible, even for administrators of the application.&lt;br /&gt;
**5 = One or two steps required, may need to be an authorized user.	&lt;br /&gt;
**10 = Just a web browser and the address bar is sufficient, without authentication.&lt;br /&gt;
&lt;br /&gt;
'''''Exploitability'''''&lt;br /&gt;
* What is needed to exploit this threat?&lt;br /&gt;
**0 = Advanced programming and networking knowledge, with custom or advanced attack tools.	&lt;br /&gt;
**5 = Malware exists on the Internet, or an exploit is easily performed, using available attack tools.	&lt;br /&gt;
**10 = Just a web browser&lt;br /&gt;
&lt;br /&gt;
'''''Affected Users'''''&lt;br /&gt;
* How many users will be affected?&lt;br /&gt;
**0 = None	&lt;br /&gt;
**5 = Some users, but not all	&lt;br /&gt;
**10 = All users&lt;br /&gt;
&lt;br /&gt;
'''''Discoverability'''''&lt;br /&gt;
* How easy is it to discover this threat?&lt;br /&gt;
**0 = Very hard to impossible; requires source code or administrative access.&lt;br /&gt;
**5 = Can figure it out by guessing or by monitoring network traces.	&lt;br /&gt;
**9 = Details of faults like this are already in the public domain and can be easily discovered using a search engine.&lt;br /&gt;
**10 = The information is visible in the web browser address bar or in a form.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' When performing a security review of an existing application, “Discoverability” will often be set to 10 by convention, as it is assumed the threat issues will be discovered.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' Using DREAD can be difficult at first. It may be helpful to think of Damage Potential and Affected Users in terms of Impact, while thinking of Reproducibility, Exploitability, and Discoverability in terms of Probability. Using the Impact vs Probability approach (which follows best practices such as defined in NIST-800-30), I would alter the formula to make the Impact score equal to the Probability score. Otherwise the probability scores have more weight in the total.&lt;br /&gt;
&lt;br /&gt;
== Alternative Threat Modeling Systems ==&lt;br /&gt;
OWASP recognizes that the adoption of the Microsoft modeling process may not fit all organizations. If STRIDE and DREAD are unacceptable for some reason, we recommend that your organization “dry run” the other threat risk models discussed against an existing application or design. This will allow you to determine which approach works best for you, and to adopt the most appropriate threat modeling tools for your organization.&lt;br /&gt;
&lt;br /&gt;
'''In summary, performing threat modeling provides a far greater return than most any other control in this Guide. Therefore, make threat risk modeling an early priority in your application design process.'''&lt;br /&gt;
&lt;br /&gt;
=== Trike ===&lt;br /&gt;
Trike is a threat modeling framework with similarities to the Microsoft threat modeling processes. However, Trike differs because it uses a risk based approach with distinct implementation, threat, and risk models, instead of using the STRIDE/DREAD aggregated threat model (attacks, threats, and weaknesses).&lt;br /&gt;
From the Trike paper, Trike’s goals are:&lt;br /&gt;
* With assistance from the system stakeholders, to ensure that the risk this system entails to each asset is acceptable to all stakeholders.&lt;br /&gt;
* Be able to tell whether we have done this.&lt;br /&gt;
* Communicate what we’ve done and its effects to the stakeholders.&lt;br /&gt;
* Empower stakeholders to understand and reduce the risks to them and other stakeholders implied by their actions within their domains. &lt;br /&gt;
&lt;br /&gt;
For more information on Trike, please see Section 6.9, reference 8.&lt;br /&gt;
&lt;br /&gt;
=== AS/NZS 4360:2004 Risk Management ===&lt;br /&gt;
The Australian/New Zealand Standard AS/NZS 4360, first issued in 1999, and revised in 2004, is the world’s first formal standard for documenting and managing risk and is still one of the few formal standards for managing it.&lt;br /&gt;
The standard’s approach is simple (it’s only 28 pages long), flexible, and iterative. Furthermore, it does not lock organizations into a particular risk management methodology, provided the methodology fulfils the AS/NZS 4360 five steps. It also provides several sets of risk tables as examples, and allows organizations to freely develop and adopt their own.&lt;br /&gt;
&lt;br /&gt;
'''The five steps of the AS/NZS 4360 process are:'''&lt;br /&gt;
* '''Establish Context:''' Establish the risk domain, i.e., which assets/systems are important?&lt;br /&gt;
* '''Identify the Risks:''' Within the risk domain, what specific risks are apparent?&lt;br /&gt;
* '''Analyze the Risks:''' Look at the risks and determine if there are any supporting controls in place.&lt;br /&gt;
* '''Evaluate the Risks:''' Determine the residual risk.&lt;br /&gt;
* '''Treat the Risks:''' Describe the method to treat the risks so that risks selected by the business will be mitigated.&lt;br /&gt;
AS/NZS 4360 assumes that risk will be managed by an '''''operational risk group''''', and that the organization has adequate skills and risk management resources in house to identify, analyze, and treat the risks.&lt;br /&gt;
&lt;br /&gt;
'''The advantages of AS/NZS 4360:'''&lt;br /&gt;
* AS/NZS 4360 works well as a risk management methodology for organizations requiring Sarbanes-Oxley compliance.&lt;br /&gt;
* AS/NZS 4360 works well for organizations that prefer to manage risks in a traditional way, such as just using likelihood and consequence to determine an overall risk. &lt;br /&gt;
* AS/NZS 4360 is familiar to most risk managers worldwide, and your organization may already have implemented an AS/NZS 4360 compatible approach.&lt;br /&gt;
* You are an Australian organization, and may be required to use it if you are audited on a regular basis, or to justify why you aren’t using it. Luckily, the STRIDE/DREAD model discussed earlier is AS/NZS 4360 compatible.&lt;br /&gt;
&lt;br /&gt;
'''The limitations of AS/NZS 4360:'''&lt;br /&gt;
* The AS/NZS 4360 approach works best for business or systemic risks than for technical risks.&lt;br /&gt;
* AS/NZS 4360 does not define the methodology to perform a structured threat risk modeling exercise.&lt;br /&gt;
* As AS/NZS 4360 is a generic framework for managing risk, it does not provide any structured method to enumerate web application security risks. &lt;br /&gt;
Although AS/NZS 4360 may be used to rank risks for security reviews, the lack of structured methods of enumerating threats for web applications makes it less desirable than other methodologies described earlier.&lt;br /&gt;
&lt;br /&gt;
=== CVSS ===&lt;br /&gt;
The US Department of Homeland Security (DHS) established the NIAC Vulnerability Disclosure Working Group, which incorporates input from Cisco Systems, Symantec, ISS, Qualys, Microsoft, CERT/CC, and eBay. One of the group’s outputs is the '''''Common Vulnerability Scoring System (CVSS).'''''&lt;br /&gt;
&lt;br /&gt;
'''The advantages of CVSS:'''&lt;br /&gt;
* You have just received notification from a security researcher or other source that your product has vulnerability, and you wish to ensure that it has an accurate and normalized severity rating, so as to alert your customers to the appropriate level of action required when you release the patch.&lt;br /&gt;
* You are a security researcher, and have found several threat exploits within an application. You would like to use the CVSS ranking system to produce reliable risk rankings, to ensure that the ISV will take the exploits seriously as indicated by their rating.&lt;br /&gt;
* CVSS has been recommended by the working group for use by US Government departments. However, it is unclear if it will become policy or be widely adopted at the time of this writing.&lt;br /&gt;
[[Category:FIXME|The first two are more scenarios than advantages]]&lt;br /&gt;
&lt;br /&gt;
'''The limitations of CVSS:'''&lt;br /&gt;
* CVSS does not find or reduce the attack surface area (i.e. design flaws), or help enumerate risks within any arbitrary piece of code, as it is just a scoring system, not a modeling methodology.&lt;br /&gt;
* CVSS is more complex than STRIDE/DREAD, as it aims to calculate the risk of announced vulnerabilities as applied to deployed software and environmental factors.&lt;br /&gt;
* The CVSS risk ranking is complex – a spreadsheet is required to calculate the risk components as the assumption behind CVSS is that a specific vulnerability has been identified and announced, or a worm or Trojan has been released targeting a small number of attack vectors. &lt;br /&gt;
* The overhead of calculating the CVSS risk ranking is quite high if applied to a thorough code review, which may have 250 or more threats to rank.&lt;br /&gt;
&lt;br /&gt;
=== OCTAVE ===&lt;br /&gt;
OCTAVE is a heavyweight risk methodology approach originating from Carnegie Mellon University’s Software Engineering Institute (SEI) in collaboration with CERT. OCTAVE focuses on organizational risk, not technical risk.&lt;br /&gt;
OCTAVE comes in two versions: Full OCTAVE, for large organizations, and OCTAVE-S for small organizations, both of which have specific catalogs of practices, profiles, and worksheets to document the modeling outcomes.&lt;br /&gt;
&lt;br /&gt;
'''OCTAVE is popular with many sites and is useful when:'''&lt;br /&gt;
* Implementing an organizational culture of risk management and controls becomes necessary.&lt;br /&gt;
* Documenting and measuring business risk becomes timely.&lt;br /&gt;
* Documenting and measuring the overall IT security risk, particularly as it relates to the corporate IT risk management, becomes necessary.&lt;br /&gt;
* When documenting risks surrounding complete systems becomes necessary.&lt;br /&gt;
* To accommodate a fundamental reorganization, such as when an organization does not have a working risk methodology in place, and requires a robust risk management framework to be put in place.&lt;br /&gt;
&lt;br /&gt;
'''The limitations of OCTAVE are:''' &lt;br /&gt;
* OCTAVE is incompatible with AS/NZS 4360, as it mandates Likelihood = 1 (i.e., It assumes a threat will always occur) and this is inappropriate for many organizations. OCTAVE-S makes the inclusion of this probability optional, but this is not part of the more comprehensive OCTAVE standard.&lt;br /&gt;
* Consisting of 18 volumes, OCTAVE is large and complex, with many worksheets and practices to implement.&lt;br /&gt;
* It does not provide a list of “out of the box” practices for assessing and mitigating web application security risks.&lt;br /&gt;
&lt;br /&gt;
Because of these issues, OWASP does not anticipate that OCTAVE will be used at large by application designers or developers, because it fails to take threat risk modeling into consideration, which is useful during all stages of development, by all participants, to reduce the overall risk of an application becoming vulnerable to attack.&lt;br /&gt;
&lt;br /&gt;
== ThreatModel SDK==&lt;br /&gt;
&lt;br /&gt;
The ThreatModel SDK is a minimalistic Java library that provides a basic vendor-neutral object model along with the ability to parse reports generated from common threat modeling tools.&lt;br /&gt;
Supported Threat Modeling Tools:&lt;br /&gt;
*Microsoft Threat Modeling Tool 2016&lt;br /&gt;
&lt;br /&gt;
Planned Threat Modeling Tools:&lt;br /&gt;
*Mozilla SeaSponge&lt;br /&gt;
&lt;br /&gt;
For more information visit: https://github.com/stevespringett/threatmodel-sdk&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
In this chapter, we have touched on the basic principles of threat risk modeling, risk management, and web application security. Applications that leverage the underlying intent of these principles will be more secure than their counterparts, which will only be minimally compliant just by including specific controls.&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
* [http://www.microsoft.com/downloads/details.aspx?FamilyId=59888078-9DAF-4E96-B7D1-944703479451 Threat Analysis &amp;amp;amp; Modeling v2.1.2], © Microsoft Corporation, 2007.  [[category:FIXME |link not working, please replace]]&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms978516.aspx Threat Modeling Web Applications], J.D. Meier, Alex Mackman, Blaine Wastell, © Microsoft Corporation, May 2005.&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms994921.aspx Improving Web Application Security: Threats and Countermeasures], J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, © Microsoft Corporation, June 2003.&lt;br /&gt;
* [http://www.microsoft.com/downloads/details.aspx?FamilyID=62830f95-0e61-4f87-88a6-e7c663444ac1&amp;amp;displaylang=en Threat Modeling], Frank Swiderski and Window Snyder, Microsoft Press, June 2004, ISBN 0-7356-1991-3.&lt;br /&gt;
* Writing Secure Code, 2nd Edition, Howard and LeBlanc, (pp. 69 – 124), Microsoft Press, 2003, ISBN 0-7356-1722-8.&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms954176.aspx The STRIDE Threat Model], © Microsoft Corporation, 2005.&lt;br /&gt;
* [http://blogs.msdn.com/david_leblanc/archive/2007/08/13/dreadful.aspx DREADful] - the DREAD system, © Microsoft Corporation, 2005.&lt;br /&gt;
* [http://dymaxion.org/trike/Trike_v1_Methodology_Document-draft.pdf A Conceptual Model for Threat Modeling Applications], Saitta, Larcom, and Michael Eddington, July 2005, http://dymaxion.org/trike/.&lt;br /&gt;
* [http://www.standards.co.nz/web-shop/?action=viewSearchProduct&amp;amp;mod=catalog&amp;amp;pid=4360:2004(AS|NZS) AS/NZS 4360:2004 Risk Management], Standards Australia and Standards New Zealand.&lt;br /&gt;
* [http://www.dhs.gov/interweb/assetlibrary/NIAC_CyberVulnerabilitiesPaper_Feb05.pdf CVSS], U.S. Department of Homeland Security library, February 2005.    [[category:FIXME |link not working, please replace]]&lt;br /&gt;
* [http://www.cert.org/octave/ OCTAVE], CERT library.&lt;br /&gt;
&lt;br /&gt;
== Appendix: Alternative open-source Risk Management tools ==&lt;br /&gt;
* [http://sourceforge.net/projects/osmr/ OSMR]&lt;br /&gt;
* [http://sourceforge.net/projects/marco/ MARCO]&lt;br /&gt;
* [http://sourceforge.net/projects/coras/ CORAS Risk Assessment Platform]&lt;br /&gt;
* [http://sourceforge.net/projects/ratiso17799/ ISO 17799 Risk Assessment Toolkit]&lt;br /&gt;
* [http://sourceforge.net/projects/easy-tra/ Easy Threat Risk Assessment]&lt;br /&gt;
* [http://sourceforge.net/projects/arms-17799/ ARMS]&lt;br /&gt;
* [http://sourceforge.net/projects/minaccia/ Minaccia]&lt;br /&gt;
* [http://sourceforge.net/projects/threatmind/ ThreatMind]&lt;br /&gt;
* [http://sourceforge.net/projects/osrmt/ Open Source Requirements Management Tool]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reference ==&lt;br /&gt;
[[Guide Table of Contents|Development Guide Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Guide_Project]]&lt;br /&gt;
[[Category:Activity]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Threat_Modeling]]&lt;br /&gt;
[[Category:SAMM-TA-1]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Threat_Risk_Modeling&amp;diff=225483</id>
		<title>Threat Risk Modeling</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Threat_Risk_Modeling&amp;diff=225483"/>
				<updated>2017-01-23T19:07:27Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
When you start a web application design, it is essential to apply threat modeling; otherwise you will squander resources, time, and money on useless controls that fail to focus on the real threats.  There are multiple approaches to threat modeling, as listed below:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt; Software centric threat modeling&lt;br /&gt;
&amp;lt;li&amp;gt; Security centric threat modeling&lt;br /&gt;
&amp;lt;li&amp;gt; Asset or risk centric threat modeling.  &lt;br /&gt;
&lt;br /&gt;
Below represents a mixture of Threat Modeling tools and industry references.&lt;br /&gt;
&lt;br /&gt;
The method used to assess risk is not nearly as important as actually performing a structured threat risk modeling. Microsoft notes that the single most important factor in their security improvement program was the corporate adoption of threat risk modeling.&lt;br /&gt;
&lt;br /&gt;
One of many considerations is Microsoft’s threat modeling process. It is simple to adopt by designers, developers, code reviewers, and the quality assurance team.&lt;br /&gt;
&lt;br /&gt;
The following sections provide some overview information (or see Section 6.9, Further Reading, for additional resources).&lt;br /&gt;
&lt;br /&gt;
== Threat Risk Modeling ==&lt;br /&gt;
Threat risk modeling is an essential process for secure web application development. It allows organizations to determine the correct controls and to produce effective countermeasures within budget. For example, there is little point in spending $100,000 for fraud control for a system that has negligible fraud risk.&lt;br /&gt;
&lt;br /&gt;
== Performing threat risk modeling using the Microsoft Threat Modeling Process == //OLD - need to replace this as these steps do not factor in Impact or probabilistic threat scenarios. R=Tp * Vp * I&lt;br /&gt;
The threat risk modeling process has five steps, enumerated below and shown graphically in Figure 1. They are:&lt;br /&gt;
# Identify Security Objectives&lt;br /&gt;
# Survey the Application&lt;br /&gt;
# Decompose it&lt;br /&gt;
# Identify Threats&lt;br /&gt;
# Identify Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Model_Flow.gif|Figure 1: Threat Model Flow]]&lt;br /&gt;
&lt;br /&gt;
Let’s consider the steps in more detail.&lt;br /&gt;
&lt;br /&gt;
=== Identify Security Objectives ===&lt;br /&gt;
The business (or project management) leadership, in concert with the software development and quality assurance teams, all need to understand the security objectives. To facilitate this, start by breaking down the application’s security objectives into the following categories:&lt;br /&gt;
&lt;br /&gt;
* '''Identity:''' Does the application protect user identity from abuse? Are there adequate controls in place to ensure evidence of identity (as required for many banking applications?)&lt;br /&gt;
* '''Financial:''' Assess the level of risk the organization is prepared to absorb in remediation, as a potential financial loss. For example, forum software may have a lower estimated financial risk than an Internet banking application.&lt;br /&gt;
* '''Reputation:''' Quantify or estimate of the loss of reputation derived from the application being misused or successfully attacked.&lt;br /&gt;
* '''Privacy and Regulatory:''' To what extent will the application have to protect user data? Forum software by its nature is public, but a tax preparation application is subject to tax regulations and privacy legislation requirements in most countries.&lt;br /&gt;
* '''Availability Guarantees:''' Is the application required to be available per a '''''Service Level Agreement (SLA)''''' or similar guarantee? Is it a nationally protected infrastructure? To what level will the application have to be available? High availability techniques are significantly more expensive, so applying the correct controls up front will save a great deal of time, resources, and money.&lt;br /&gt;
&lt;br /&gt;
This is by no means an exhaustive list, but it gives an idea of some of the business risk decisions leading into selecting and building security controls.&lt;br /&gt;
&lt;br /&gt;
Other sources of risk guidance come from:&lt;br /&gt;
* Laws (such as privacy or finance laws)&lt;br /&gt;
* Regulations (such as banking or e-commerce regulations)&lt;br /&gt;
* Standards (such as ISO 17799)&lt;br /&gt;
* Legal Agreements (such as payment card industry standards or merchant agreements)&lt;br /&gt;
* Corporate Information Security Policy&lt;br /&gt;
&lt;br /&gt;
=== Application Overview ===&lt;br /&gt;
Once the security objectives have been defined, analyze the application design to identify the '''''components''''', '''''data flows''''', and '''''trust boundaries'''''.&lt;br /&gt;
&lt;br /&gt;
Do this by surveying the application’s architecture and design documentation. In particular, look for UML component diagrams. Such high level component diagrams are generally sufficient to understand how and why data flows to various places. For example, data movement across a trust boundary (such as from the Internet to the web tier, or from the business logic to the database server), needs to be carefully analyzed, whereas data that flows within the same trust level does not need as much scrutiny.&lt;br /&gt;
&lt;br /&gt;
=== Decompose Application ===&lt;br /&gt;
Once the application architecture is understood then decompose it further, to identify the features and modules with a security impact that need to be evaluated. For example, when investigating the authentication module, it is necessary to understand how data enters the module, how the module validates and processes the data, where the data flows, how the data is stored, and what fundamental decisions and assumptions are made by the module.&lt;br /&gt;
&lt;br /&gt;
=== Identify Threats ===&lt;br /&gt;
It is impossible to write down unknown threats, but it is likewise unlikely that new malware will be created to exploit new vulnerabilities within custom systems. Therefore, concentrate on known risks, which can be easily demonstrated using tools or techniques from Bugtraq.&lt;br /&gt;
&lt;br /&gt;
Microsoft suggests two different approaches for writing up threats. One is a threat graph, as shown in Figure 2, and the other is a structured list. &amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:FIXME|Change 3rd orange box in graphic to &amp;quot;Authorization MAY fail&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Threat_Graph.gif|Figure 2: Threat Graph]]&lt;br /&gt;
&lt;br /&gt;
Typically, a threat graph imparts more information quickly but it takes longer to construct, while a structured list is easier to create but it will take longer for the threat impacts to become obvious.&lt;br /&gt;
&lt;br /&gt;
# Attacker may be able to read other user’s messages&lt;br /&gt;
# User may not have logged off on a shared PC&lt;br /&gt;
# Data validation may allow SQL injection&lt;br /&gt;
# Implement data validation&lt;br /&gt;
# Authorization may fail, allowing unauthorized access&lt;br /&gt;
# Implement authorization checks&lt;br /&gt;
# Browser cache may contain contents of message&lt;br /&gt;
# Implement anti-caching directive in HTTP headers&lt;br /&gt;
# If eavesdropping risk is high, use SSL&lt;br /&gt;
&lt;br /&gt;
Note that it takes a motivated attacker to exploit a threat; they generally want something from your application or to obviate controls. To understand the relevant threats, use the following categories to understand who might attack the application:&lt;br /&gt;
&lt;br /&gt;
* '''Accidental Discovery:''' An ordinary user stumbles across a functional mistake in your application, just using a web browser, and gains access to privileged information or functionality.&lt;br /&gt;
* '''Automated Malware:''' Programs or scripts, which are searching for known vulnerabilities, and then report them back to a central collection site.&lt;br /&gt;
* '''The Curious Attacker:''' a security researcher or ordinary user, who notices something wrong with the application, and decides to pursue further.&lt;br /&gt;
* '''Script Kiddies:''' Common renegades, seeking to compromise or deface applications for collateral gain, notoriety, or a political agenda, perhaps using the attack categories described in the ''OWASP Web Application Penetration Checklist.''&lt;br /&gt;
* '''The Motivated Attacker:''' Potentially, a disgruntled staff member with inside knowledge or a paid professional attacker.&lt;br /&gt;
* '''Organized Crime:''' Criminals seeking high stake payouts, such as cracking e-commerce or corporate banking applications, for financial gain.&lt;br /&gt;
&lt;br /&gt;
It is vital to understand the level of attacker you are defending against. For example, a motivated attacker, who understands your internal processes is often more dangerous than script kiddies.&lt;br /&gt;
&lt;br /&gt;
=== STRIDE ===&lt;br /&gt;
STRIDE is a classification scheme for characterizing known threats according to the kinds of exploit that are used (or motivation of the attacker). The STRIDE acronym is formed from the first letter of each of the following categories.&lt;br /&gt;
&lt;br /&gt;
'''''Spoofing Identity'''''&lt;br /&gt;
“Identity spoofing” is a key risk for applications that have many users but provide a single execution context at the application and database level. In particular, users should not be able to become any other user or assume the attributes of another user.&lt;br /&gt;
&lt;br /&gt;
'''''Tampering with Data'''''&lt;br /&gt;
Users can potentially change data delivered to them, return it, and thereby potentially manipulate client-side validation, GET and POST results, cookies, HTTP headers, and so forth. The application should not send data to the user, such as interest rates or periods, which are obtainable only from within the application itself. The application should also carefully check data received from the user and validate that it is sane and applicable before storing or using it.&lt;br /&gt;
&lt;br /&gt;
'''''Repudiation'''''&lt;br /&gt;
Users may dispute transactions if there is insufficient auditing or recordkeeping of their activity. For example, if a user says, “But I didn’t transfer any money to this external account!”, and you cannot track his/her activities through the application, then it is extremely likely that the transaction will have to be written off as a loss.&lt;br /&gt;
&lt;br /&gt;
Therefore, consider if the application requires non-repudiation controls, such as web access logs, audit trails at each tier, or the same user context from top to bottom. Preferably, the application should run with the user’s privileges, not more, but this may not be possible with many off-the-shelf application frameworks.&lt;br /&gt;
&lt;br /&gt;
'''''Information Disclosure'''''&lt;br /&gt;
Users are rightfully wary of submitting private details to a system. If it is possible for an attacker to publicly reveal user data at large, whether anonymously or as an authorized user, there will be an immediate loss of confidence and a substantial period of reputation loss. Therefore, applications must include strong controls to prevent user ID tampering and abuse, particularly if they use a single context to run the entire application. &lt;br /&gt;
&lt;br /&gt;
Also, consider if the user’s web browser may leak information. Some web browsers may ignore the no caching directives in HTTP headers or handle them incorrectly. In a corresponding fashion, every secure application has a responsibility to minimize the amount of information stored by the web browser, just in case it leaks or leaves information behind, which can be used by an attacker to learn details about the application, the user, or to potentially become that user.&lt;br /&gt;
&lt;br /&gt;
Finally, in implementing persistent values, keep in mind that the use of hidden fields is insecure by nature. Such storage should not be relied on to secure sensitive information or to provide adequate personal privacy safeguards.&lt;br /&gt;
&lt;br /&gt;
'''''Denial of Service'''''&lt;br /&gt;
Application designers should be aware that their applications may be subject to a denial of service attack. Therefore, the use of expensive resources such as large files, complex calculations, heavy-duty searches, or long queries should be reserved for authenticated and authorized users, and not available to anonymous users.&lt;br /&gt;
&lt;br /&gt;
For applications that do not have this luxury, every facet of the application should be engineered to perform as little work as possible, to use fast and few database queries, to avoid exposing large files or unique links per user, in order to prevent simple denial of service attacks.&lt;br /&gt;
&lt;br /&gt;
'''''Elevation of Privilege'''''&lt;br /&gt;
If an application provides distinct user and administrative roles, then it is vital to ensure that the user cannot elevate his/her role to a higher privilege one. In particular, simply not displaying privileged role links is insufficient. Instead, all actions should be gated through an authorization matrix, to ensure that only the permitted roles can access privileged functionality.&lt;br /&gt;
&lt;br /&gt;
=== DREAD ===&lt;br /&gt;
DREAD is a classification scheme for quantifying, comparing and prioritizing the amount of risk presented by each evaluated threat.  The DREAD acronym is formed from the first letter of each category below.&lt;br /&gt;
&lt;br /&gt;
DREAD modeling influences the thinking behind setting the risk rating, and is also used directly to sort the risks. The DREAD algorithm, shown below, is used to compute a risk value, which is an average of all five categories.&lt;br /&gt;
&lt;br /&gt;
'''Risk_DREAD''' = (&amp;lt;u&amp;gt;D&amp;lt;/u&amp;gt;AMAGE + &amp;lt;u&amp;gt;R&amp;lt;/u&amp;gt;EPRODUCIBILITY + &amp;lt;u&amp;gt;E&amp;lt;/u&amp;gt;XPLOITABILITY + &amp;lt;u&amp;gt;A&amp;lt;/u&amp;gt;FFECTED USERS + &amp;lt;u&amp;gt;D&amp;lt;/u&amp;gt;ISCOVERABILITY) / 5&lt;br /&gt;
&lt;br /&gt;
The calculation always produces a number between 0 and 10; the higher the number, the more serious the risk.&lt;br /&gt;
&lt;br /&gt;
Here are some examples of how to quantify the DREAD categories.&lt;br /&gt;
&lt;br /&gt;
'''''Damage Potential'''''&lt;br /&gt;
* If a threat exploit occurs, how much damage will be caused?&lt;br /&gt;
**0 = Nothing	&lt;br /&gt;
**5 = Individual user data is compromised or affected.	&lt;br /&gt;
**10 = Complete system or data destruction&lt;br /&gt;
&lt;br /&gt;
'''''Reproducibility'''''&lt;br /&gt;
* How easy is it to reproduce the threat exploit?&lt;br /&gt;
**0 = Very hard or impossible, even for administrators of the application.&lt;br /&gt;
**5 = One or two steps required, may need to be an authorized user.	&lt;br /&gt;
**10 = Just a web browser and the address bar is sufficient, without authentication.&lt;br /&gt;
&lt;br /&gt;
'''''Exploitability'''''&lt;br /&gt;
* What is needed to exploit this threat?&lt;br /&gt;
**0 = Advanced programming and networking knowledge, with custom or advanced attack tools.	&lt;br /&gt;
**5 = Malware exists on the Internet, or an exploit is easily performed, using available attack tools.	&lt;br /&gt;
**10 = Just a web browser&lt;br /&gt;
&lt;br /&gt;
'''''Affected Users'''''&lt;br /&gt;
* How many users will be affected?&lt;br /&gt;
**0 = None	&lt;br /&gt;
**5 = Some users, but not all	&lt;br /&gt;
**10 = All users&lt;br /&gt;
&lt;br /&gt;
'''''Discoverability'''''&lt;br /&gt;
* How easy is it to discover this threat?&lt;br /&gt;
**0 = Very hard to impossible; requires source code or administrative access.&lt;br /&gt;
**5 = Can figure it out by guessing or by monitoring network traces.	&lt;br /&gt;
**9 = Details of faults like this are already in the public domain and can be easily discovered using a search engine.&lt;br /&gt;
**10 = The information is visible in the web browser address bar or in a form.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' When performing a security review of an existing application, “Discoverability” will often be set to 10 by convention, as it is assumed the threat issues will be discovered.&lt;br /&gt;
&lt;br /&gt;
'''Note:''' Using DREAD can be difficult at first. It may be helpful to think of Damage Potential and Affected Users in terms of Impact, while thinking of Reproducibility, Exploitability, and Discoverability in terms of Probability. Using the Impact vs Probability approach (which follows best practices such as defined in NIST-800-30), I would alter the formula to make the Impact score equal to the Probability score. Otherwise the probability scores have more weight in the total.&lt;br /&gt;
&lt;br /&gt;
== Alternative Threat Modeling Systems ==&lt;br /&gt;
OWASP recognizes that the adoption of the Microsoft modeling process may not fit all organizations. If STRIDE and DREAD are unacceptable for some reason, we recommend that your organization “dry run” the other threat risk models discussed against an existing application or design. This will allow you to determine which approach works best for you, and to adopt the most appropriate threat modeling tools for your organization.&lt;br /&gt;
&lt;br /&gt;
'''In summary, performing threat modeling provides a far greater return than most any other control in this Guide. Therefore, make threat risk modeling an early priority in your application design process.'''&lt;br /&gt;
&lt;br /&gt;
=== Trike ===&lt;br /&gt;
Trike is a threat modeling framework with similarities to the Microsoft threat modeling processes. However, Trike differs because it uses a risk based approach with distinct implementation, threat, and risk models, instead of using the STRIDE/DREAD aggregated threat model (attacks, threats, and weaknesses).&lt;br /&gt;
From the Trike paper, Trike’s goals are:&lt;br /&gt;
* With assistance from the system stakeholders, to ensure that the risk this system entails to each asset is acceptable to all stakeholders.&lt;br /&gt;
* Be able to tell whether we have done this.&lt;br /&gt;
* Communicate what we’ve done and its effects to the stakeholders.&lt;br /&gt;
* Empower stakeholders to understand and reduce the risks to them and other stakeholders implied by their actions within their domains. &lt;br /&gt;
&lt;br /&gt;
For more information on Trike, please see Section 6.9, reference 8.&lt;br /&gt;
&lt;br /&gt;
=== AS/NZS 4360:2004 Risk Management ===&lt;br /&gt;
The Australian/New Zealand Standard AS/NZS 4360, first issued in 1999, and revised in 2004, is the world’s first formal standard for documenting and managing risk and is still one of the few formal standards for managing it.&lt;br /&gt;
The standard’s approach is simple (it’s only 28 pages long), flexible, and iterative. Furthermore, it does not lock organizations into a particular risk management methodology, provided the methodology fulfils the AS/NZS 4360 five steps. It also provides several sets of risk tables as examples, and allows organizations to freely develop and adopt their own.&lt;br /&gt;
&lt;br /&gt;
'''The five steps of the AS/NZS 4360 process are:'''&lt;br /&gt;
* '''Establish Context:''' Establish the risk domain, i.e., which assets/systems are important?&lt;br /&gt;
* '''Identify the Risks:''' Within the risk domain, what specific risks are apparent?&lt;br /&gt;
* '''Analyze the Risks:''' Look at the risks and determine if there are any supporting controls in place.&lt;br /&gt;
* '''Evaluate the Risks:''' Determine the residual risk.&lt;br /&gt;
* '''Treat the Risks:''' Describe the method to treat the risks so that risks selected by the business will be mitigated.&lt;br /&gt;
AS/NZS 4360 assumes that risk will be managed by an '''''operational risk group''''', and that the organization has adequate skills and risk management resources in house to identify, analyze, and treat the risks.&lt;br /&gt;
&lt;br /&gt;
'''The advantages of AS/NZS 4360:'''&lt;br /&gt;
* AS/NZS 4360 works well as a risk management methodology for organizations requiring Sarbanes-Oxley compliance.&lt;br /&gt;
* AS/NZS 4360 works well for organizations that prefer to manage risks in a traditional way, such as just using likelihood and consequence to determine an overall risk. &lt;br /&gt;
* AS/NZS 4360 is familiar to most risk managers worldwide, and your organization may already have implemented an AS/NZS 4360 compatible approach.&lt;br /&gt;
* You are an Australian organization, and may be required to use it if you are audited on a regular basis, or to justify why you aren’t using it. Luckily, the STRIDE/DREAD model discussed earlier is AS/NZS 4360 compatible.&lt;br /&gt;
&lt;br /&gt;
'''The limitations of AS/NZS 4360:'''&lt;br /&gt;
* The AS/NZS 4360 approach works best for business or systemic risks than for technical risks.&lt;br /&gt;
* AS/NZS 4360 does not define the methodology to perform a structured threat risk modeling exercise.&lt;br /&gt;
* As AS/NZS 4360 is a generic framework for managing risk, it does not provide any structured method to enumerate web application security risks. &lt;br /&gt;
Although AS/NZS 4360 may be used to rank risks for security reviews, the lack of structured methods of enumerating threats for web applications makes it less desirable than other methodologies described earlier.&lt;br /&gt;
&lt;br /&gt;
=== CVSS ===&lt;br /&gt;
The US Department of Homeland Security (DHS) established the NIAC Vulnerability Disclosure Working Group, which incorporates input from Cisco Systems, Symantec, ISS, Qualys, Microsoft, CERT/CC, and eBay. One of the group’s outputs is the '''''Common Vulnerability Scoring System (CVSS).'''''&lt;br /&gt;
&lt;br /&gt;
'''The advantages of CVSS:'''&lt;br /&gt;
* You have just received notification from a security researcher or other source that your product has vulnerability, and you wish to ensure that it has an accurate and normalized severity rating, so as to alert your customers to the appropriate level of action required when you release the patch.&lt;br /&gt;
* You are a security researcher, and have found several threat exploits within an application. You would like to use the CVSS ranking system to produce reliable risk rankings, to ensure that the ISV will take the exploits seriously as indicated by their rating.&lt;br /&gt;
* CVSS has been recommended by the working group for use by US Government departments. However, it is unclear if it will become policy or be widely adopted at the time of this writing.&lt;br /&gt;
[[Category:FIXME|The first two are more scenarios than advantages]]&lt;br /&gt;
&lt;br /&gt;
'''The limitations of CVSS:'''&lt;br /&gt;
* CVSS does not find or reduce the attack surface area (i.e. design flaws), or help enumerate risks within any arbitrary piece of code, as it is just a scoring system, not a modeling methodology.&lt;br /&gt;
* CVSS is more complex than STRIDE/DREAD, as it aims to calculate the risk of announced vulnerabilities as applied to deployed software and environmental factors.&lt;br /&gt;
* The CVSS risk ranking is complex – a spreadsheet is required to calculate the risk components as the assumption behind CVSS is that a specific vulnerability has been identified and announced, or a worm or Trojan has been released targeting a small number of attack vectors. &lt;br /&gt;
* The overhead of calculating the CVSS risk ranking is quite high if applied to a thorough code review, which may have 250 or more threats to rank.&lt;br /&gt;
&lt;br /&gt;
=== OCTAVE ===&lt;br /&gt;
OCTAVE is a heavyweight risk methodology approach originating from Carnegie Mellon University’s Software Engineering Institute (SEI) in collaboration with CERT. OCTAVE focuses on organizational risk, not technical risk.&lt;br /&gt;
OCTAVE comes in two versions: Full OCTAVE, for large organizations, and OCTAVE-S for small organizations, both of which have specific catalogs of practices, profiles, and worksheets to document the modeling outcomes.&lt;br /&gt;
&lt;br /&gt;
'''OCTAVE is popular with many sites and is useful when:'''&lt;br /&gt;
* Implementing an organizational culture of risk management and controls becomes necessary.&lt;br /&gt;
* Documenting and measuring business risk becomes timely.&lt;br /&gt;
* Documenting and measuring the overall IT security risk, particularly as it relates to the corporate IT risk management, becomes necessary.&lt;br /&gt;
* When documenting risks surrounding complete systems becomes necessary.&lt;br /&gt;
* To accommodate a fundamental reorganization, such as when an organization does not have a working risk methodology in place, and requires a robust risk management framework to be put in place.&lt;br /&gt;
&lt;br /&gt;
'''The limitations of OCTAVE are:''' &lt;br /&gt;
* OCTAVE is incompatible with AS/NZS 4360, as it mandates Likelihood = 1 (i.e., It assumes a threat will always occur) and this is inappropriate for many organizations. OCTAVE-S makes the inclusion of this probability optional, but this is not part of the more comprehensive OCTAVE standard.&lt;br /&gt;
* Consisting of 18 volumes, OCTAVE is large and complex, with many worksheets and practices to implement.&lt;br /&gt;
* It does not provide a list of “out of the box” practices for assessing and mitigating web application security risks.&lt;br /&gt;
&lt;br /&gt;
Because of these issues, OWASP does not anticipate that OCTAVE will be used at large by application designers or developers, because it fails to take threat risk modeling into consideration, which is useful during all stages of development, by all participants, to reduce the overall risk of an application becoming vulnerable to attack.&lt;br /&gt;
&lt;br /&gt;
== ThreatModel SDK==&lt;br /&gt;
&lt;br /&gt;
The ThreatModel SDK is a minimalistic Java library that provides a basic vendor-neutral object model along with the ability to parse reports generated from common threat modeling tools.&lt;br /&gt;
Supported Threat Modeling Tools:&lt;br /&gt;
*Microsoft Threat Modeling Tool 2016&lt;br /&gt;
&lt;br /&gt;
Planned Threat Modeling Tools:&lt;br /&gt;
*Mozilla SeaSponge&lt;br /&gt;
&lt;br /&gt;
For more information visit: https://github.com/stevespringett/threatmodel-sdk&lt;br /&gt;
&lt;br /&gt;
== Conclusion ==&lt;br /&gt;
In this chapter, we have touched on the basic principles of threat risk modeling, risk management, and web application security. Applications that leverage the underlying intent of these principles will be more secure than their counterparts, which will only be minimally compliant just by including specific controls.&lt;br /&gt;
&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
* [http://www.microsoft.com/downloads/details.aspx?FamilyId=59888078-9DAF-4E96-B7D1-944703479451 Threat Analysis &amp;amp;amp; Modeling v2.1.2], © Microsoft Corporation, 2007.  [[category:FIXME |link not working, please replace]]&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms978516.aspx Threat Modeling Web Applications], J.D. Meier, Alex Mackman, Blaine Wastell, © Microsoft Corporation, May 2005.&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms994921.aspx Improving Web Application Security: Threats and Countermeasures], J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, © Microsoft Corporation, June 2003.&lt;br /&gt;
* [http://www.microsoft.com/downloads/details.aspx?FamilyID=62830f95-0e61-4f87-88a6-e7c663444ac1&amp;amp;displaylang=en Threat Modeling], Frank Swiderski and Window Snyder, Microsoft Press, June 2004, ISBN 0-7356-1991-3.&lt;br /&gt;
* Writing Secure Code, 2nd Edition, Howard and LeBlanc, (pp. 69 – 124), Microsoft Press, 2003, ISBN 0-7356-1722-8.&lt;br /&gt;
* [http://msdn.microsoft.com/library/ms954176.aspx The STRIDE Threat Model], © Microsoft Corporation, 2005.&lt;br /&gt;
* [http://blogs.msdn.com/david_leblanc/archive/2007/08/13/dreadful.aspx DREADful] - the DREAD system, © Microsoft Corporation, 2005.&lt;br /&gt;
* [http://dymaxion.org/trike/Trike_v1_Methodology_Document-draft.pdf A Conceptual Model for Threat Modeling Applications], Saitta, Larcom, and Michael Eddington, July 2005, http://dymaxion.org/trike/.&lt;br /&gt;
* [http://www.standards.co.nz/web-shop/?action=viewSearchProduct&amp;amp;mod=catalog&amp;amp;pid=4360:2004(AS|NZS) AS/NZS 4360:2004 Risk Management], Standards Australia and Standards New Zealand.&lt;br /&gt;
* [http://www.dhs.gov/interweb/assetlibrary/NIAC_CyberVulnerabilitiesPaper_Feb05.pdf CVSS], U.S. Department of Homeland Security library, February 2005.    [[category:FIXME |link not working, please replace]]&lt;br /&gt;
* [http://www.cert.org/octave/ OCTAVE], CERT library.&lt;br /&gt;
&lt;br /&gt;
== Appendix: Alternative open-source Risk Management tools ==&lt;br /&gt;
* [http://sourceforge.net/projects/osmr/ OSMR]&lt;br /&gt;
* [http://sourceforge.net/projects/marco/ MARCO]&lt;br /&gt;
* [http://sourceforge.net/projects/coras/ CORAS Risk Assessment Platform]&lt;br /&gt;
* [http://sourceforge.net/projects/ratiso17799/ ISO 17799 Risk Assessment Toolkit]&lt;br /&gt;
* [http://sourceforge.net/projects/easy-tra/ Easy Threat Risk Assessment]&lt;br /&gt;
* [http://sourceforge.net/projects/arms-17799/ ARMS]&lt;br /&gt;
* [http://sourceforge.net/projects/minaccia/ Minaccia]&lt;br /&gt;
* [http://sourceforge.net/projects/threatmind/ ThreatMind]&lt;br /&gt;
* [http://sourceforge.net/projects/osrmt/ Open Source Requirements Management Tool]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reference ==&lt;br /&gt;
[[Guide Table of Contents|Development Guide Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Guide_Project]]&lt;br /&gt;
[[Category:Activity]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Threat_Modeling]]&lt;br /&gt;
[[Category:SAMM-TA-1]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220955</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220955"/>
				<updated>2016-09-01T17:24:38Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== '''Atlanta Georgia OWASP Chapter Leaders'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Becoming a Member or Sponsor''' ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Chapter Meetings''' ==&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Before our migration to the above mentioned meetup.com site, we have the following historic meeting archives.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220954</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220954"/>
				<updated>2016-09-01T17:23:50Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== '''Atlanta Georgia OWASP Chapter Leaders'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Before our migration to the above mentioned meetup.com site, we have the following historic meeting archives.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220953</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220953"/>
				<updated>2016-09-01T17:21:16Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220952</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220952"/>
				<updated>2016-09-01T17:20:14Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Chapter Meetings  ===&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220951</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220951"/>
				<updated>2016-09-01T17:19:24Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220950</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=220950"/>
				<updated>2016-09-01T17:18:32Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:andrew.hamilton@owasp.org Andrew Hamilton] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[mailto:zakiya.bailey@owasp.org Zakiya Bailey]- Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2014 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2014.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=205375</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=205375"/>
				<updated>2015-12-19T15:10:17Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Tony UV */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and CEO of VerSprite - a global security consulting firm based in Atlanta, GA. He is also the author of Wiley's &amp;lt;i&amp;gt;Risk Centric Threat Modeling&amp;lt;/i&amp;gt;, a book based upon a patented methodology that applies a risk or asset centric approach to threat modeling. Tony has spoken at numerous OWASP, ISACA, ASIS, ISC2, ISSA, BSides conferences across four continents on the topics of application security, risk management, threat modeling, secure software development life cycles, and also conducted various training briefings to both development groups and company executives who need to understand the impact of security programs to business/ product objectives.  Tony's 20 years of IT/IS experience began with hands-on operations in the areas of system administration, network engineering, software development.  His IT formation, combined with his work in penetration testing, dynamic/ static application testing, security architecture, vulnerability and risk management,  has served Tony well to speak on realistic challenges and solutions for IT groups and businesses alike in applying realistic security measures to enterprise processes.  Tony serves as interim CISO for various startups and mid-size organization and is responsible for the overall build out of these security programs.&lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Prior to starting VerSprite, Tony served as a professional security consultant at Dell-SecureWorks and Symantec, and also worked as a security leader across various Fortune 500 banking, financial, and information services organizations in the global Fortune 500 ranking. Tony's leadership roles experience in security includes companies such as Equifax, SunTrust Banks, Morgan Stanley, Symantec, and SecureWorks. &amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He also organizes BSides Atlanta – an underground grassroots un-conference that takes place annually and aims at providing new ideas and real conversations/ solutions around common challenges in InfoSec today.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=205374</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=205374"/>
				<updated>2015-12-19T14:10:54Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Tony UV */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and managing partner at VerSprite in Atlanta - a strategic, security pro service firm that is known for their hybrid approach to security service delivery and threat modeling approach to application security.  Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments.  His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits.  Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. Tony's leadership roles experience in security includes companies such as Equifax, SunTrust Banks, Morgan Stanley, Symantec, and SecureWorks. &lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He is also serves on the OWASP Global Membership Board and regularly provides talks to other chapters nationwide, primarily on the topic of application threat modeling. Aside from the OWASP organization, Tony has helped to organize BSides Atlanta – an underground grassroots effort aimed at providing 100%, unsolicited security content to Atlanta Information Security professionals – for free.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=190358</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=190358"/>
				<updated>2015-02-27T02:43:48Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Atlanta Georgia OWASP Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Mark McLauchlin - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2014 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2014.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=185436</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=185436"/>
				<updated>2014-11-16T03:13:58Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Thank You to Our 2014 Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Mark McLauchlin - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;David Screws - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2014 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2014.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=185435</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=185435"/>
				<updated>2014-11-16T03:12:24Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Atlanta Georgia OWASP Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Mark McLauchlin - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;David Screws - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2014 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2014.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=182264</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=182264"/>
				<updated>2014-09-13T00:13:02Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Thank You to Our 2012 Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Roy-Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2014 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2014.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Insecure_Web_Components_Project&amp;diff=182259</id>
		<title>OWASP Insecure Web Components Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Insecure_Web_Components_Project&amp;diff=182259"/>
				<updated>2014-09-12T23:47:11Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Project Leader */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Insecure Web Components Project==&lt;br /&gt;
&lt;br /&gt;
Helping to build and secure better web applications through the identification of insecure web components.&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
The OWASP Insecure Web Components Project is a repository of identified vulnerable components in popular web application frameworks and languages.  The goal is to give developers and security professionals alike a centralized location where they can identify these vulnerable components when building and securing web applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The focus of this project are the insecure components that make up popular web applications, and frameworks.  These can be everything from Struts 2 tags, to ASP.NET MVC Models.  We want to build a comprehensive list that can be used to help uncover issues in current implementations of web applications and aid in the secure architecture of them as well.&lt;br /&gt;
&lt;br /&gt;
==Component Categories==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Insecure_Web_Components_Project/Struts2 Struts2]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
OWASP Insecure Web Components Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
Tony UcedaVelez &amp;quot;UV&amp;quot;&lt;br /&gt;
Benjamin Watson&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_CODE.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
; Q1&lt;br /&gt;
: A1&lt;br /&gt;
&lt;br /&gt;
; Q2&lt;br /&gt;
: A2&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Volunteers==&lt;br /&gt;
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:&lt;br /&gt;
&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
==Others==&lt;br /&gt;
* xxx&lt;br /&gt;
* xxx&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
As of 2014 our current priorities are identifying insecure components in J2EE applications and Java Web Application Frameworks.  This includes Struts, Spring, Wicket, Grails, and so forth.  We are looking at everything from API related components to configuration and environment.&lt;br /&gt;
&lt;br /&gt;
Involvement in the development and promotion of the OWASP Insecure Web Components Project is actively encouraged!&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
* Contact Tony UV&lt;br /&gt;
* Contact Benjamin Watson&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
{{:Projects/OWASP_Insecure_Web_Components_Project}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=170636</id>
		<title>User:Tony UcedaVelez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Tony_UcedaVelez&amp;diff=170636"/>
				<updated>2014-03-22T22:51:05Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Tony UV */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Tony UV ==&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
In the realm of application security, Tony is a threat modeling evangelist and has provided numerous talks domestically and globally on its many benefits and application.  He has served as a guest mentor to teams participating in Kennesaw State University’s annual Cybercrime capture the flag event as well as a Cybercrime speaker for Southern Polytechnic University in Atlanta (2009).  He has also served as a guest speaker on the subject of application threat modeling during ISACA’s annual Geek Week event and has also served as a keynote speaker on the subject for ISACA’s Global Symposium web cast series He frequently speaks at various ISACA and OWASP based events nationwide.  Additional publications include articles related to CoBIT and the ValIT model (ISACA’s Journal), application threat modeling within the SDLC (InSecureMagazine), and security process engineering for a ROSI (return on security investment) (Journal of Finance).  His book on Application Threat Modeling is due to be published in late 2011 along with his co-author and Cincinnati Chapter Lead, [User:Marco_Morana].&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is also well regarded in the field of FISMA compliance, having worked with various federal entities and their respective certification &amp;amp; accreditation groups in order to manage compliance requirements against both NIST and FIPS requirements for ensuring data and system level security. NIST has invited Tony to speak twice at their annual SCAP conference in Baltimore on the subject of sustaining compliance across large federal information enterprises. &lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Tony is the founder and managing partner at VerSprite in Atlanta - a strategic, security pro service firm that is known for their hybrid approach to security service delivery and threat modeling approach to application security.  Prior to VerSprite, Tony served as Sr. Director of Security Risk Management to a Fortune 50 organization where he led security assessments against global application environments.  His work encompassed web application security testing, security architecture reviews, and analysis for business logic exploits.  Previous to this role, he spent more than 5 years in the field of application security across other Fortune 500 organizations within the banking, telecom, and information service industry segments. Tony's leadership roles experience in security includes companies such as Equifax, SunTrust Banks, Morgan Stanley, Symantec, and SecureWorks. &lt;br /&gt;
&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Since late 2007, Tony leads the OWASP Atlanta Chapter, where he manages monthly workshops and events for the Atlanta web application security community.  He is also serves on the OWASP Global Membership Board and regularly provides talks to other chapters nationwide, primarily on the topic of application threat modeling. Aside from the OWASP organization, Tony has helped to organize BSides Atlanta – an underground grassroots effort aimed at providing 100%, unsolicited security content to Atlanta Information Security professionals – for free.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=141538</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=141538"/>
				<updated>2012-12-28T04:12:11Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Meeting Archive on Meetup.com */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Roy-Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:wipro.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:WiKID_logo.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Dec 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=141537</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=141537"/>
				<updated>2012-12-28T04:11:57Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Meeting Archive on Meetup.com */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Roy-Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:wipro.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:WiKID_logo.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/94108492/ Nov 2012 - Building a Secure SDLC w/ OWASP Projects]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88009182/ Nov 2012 - Web Security CTF (primer)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/90863212/ AppSec for CISOs Breakfast]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/88192022/ 2012 Metro Atlanta ISSA Conference]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/87110162/ Oct 2012 - Security Testing Techniques]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77080162/ Sep 2012 - Social Networks &amp;amp; Fake Accounts: New Heaven for Spammers &amp;amp; Attackers]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/77588622/ August 2012 - HD Moore presents 'The Long Tail of Security']&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/71686572/ July 2012 - HTML5 Security: A Beautiful Disaster]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/60876802/ June 2012 - Is There An End to Testing Ourselves Secure?]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/64176042/ May 2012 - Attack Chaining: Advanced Maneuvers for Hack Fu ]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/50563772/ April 2012 - Practical Android Security (Jack Mannino, nVisium Security)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=130800</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=130800"/>
				<updated>2012-05-31T18:35:18Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Thank You to Our 2012 Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Roy-Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:wipro.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:WiKID_logo.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
Please check http://www.meetup.com/OWASP-Atlanta/events/ for a list of upcoming future meetings.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive on Meetup.com =&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=127922</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=127922"/>
				<updated>2012-04-16T17:06:52Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Meeting Archive */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:wipro.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===April 2012 Meeting===&lt;br /&gt;
'''WHAT::''' Practical Android Security&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' April 26, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jack Mannino, nVisium Security &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' &lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security &amp;quot;quick wins&amp;quot; during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
&lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''BIO::'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the co-leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive =&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/54085342/  March 2012 - Trustwave 2012 Global Security Report - Trustwave]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=127921</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=127921"/>
				<updated>2012-04-16T17:01:44Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:wipro.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:Trustwave.jpg|200px]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===April 2012 Meeting===&lt;br /&gt;
'''WHAT::''' Practical Android Security&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' April 26, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jack Mannino, nVisium Security &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' &lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security &amp;quot;quick wins&amp;quot; during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
&lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''BIO::'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the co-leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive =&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ February 2012 - Scanning Web2.0 – web applications aren’t web sites anymore (Kiril Mendelev, HP)]&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=123350</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=123350"/>
				<updated>2012-01-27T06:03:49Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* February 2012 Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  3535 Piedmont Rd NE #1400, Atlanta,GA&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Meeting Archive =&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/events/45830712/ January 2012 - Ninja Assessments: Stealth Security Testing for Organizations (Kevin Johnson, SamuraiWTF)]&lt;br /&gt;
&lt;br /&gt;
== Old meeting pages (before 2012) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122446</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122446"/>
				<updated>2012-01-06T15:40:12Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122444</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122444"/>
				<updated>2012-01-06T15:39:33Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT:''' Although you can subscribe to the mailing list above and this allows for the global board to track registered members, for OWASP ATL, please see the MeetUp.com site referenced below in order to get the latest on local chapter events. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122442</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122442"/>
				<updated>2012-01-06T15:37:15Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Meetup Group */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Join OWASP ATL via our Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. MeetUp.com will replace the traditional subscriber email list eventually (referenced above in the top of this page).  It allows us to better communicate with members, RSVP for events, and announce meetings - all in one place.  Click on the following link to visit our meetup page and signup.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122441</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122441"/>
				<updated>2012-01-06T15:34:38Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122440</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122440"/>
				<updated>2012-01-06T15:34:08Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]}}|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122439</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122439"/>
				<updated>2012-01-06T15:31:12Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122438</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122438"/>
				<updated>2012-01-06T15:30:34Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]}}&amp;lt;!--|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122421</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122421"/>
				<updated>2012-01-06T01:54:09Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Scanning Web2.0 – web applications aren’t web sites anymore'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 16, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kirill Mendelev is a researcher and an architect at HP Enterprise Security Products (specifically ex-SPI Dynamics part of it). He has been with HP for 7 years now, focusing on Web technologies for load-testing (LoadRunner) and security testing (WebInspect) purposes. I’ve lead research projects aiming to remedy threat of evolving Web technologies to both products.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Kirill is going to speak about problems we encountered while scanning modern web applications, and how we’re planning to solve them.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122419</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122419"/>
				<updated>2012-01-06T01:42:09Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Past Meetings  (2011 &amp;amp; Before) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Meetup Group'''  ==&lt;br /&gt;
&lt;br /&gt;
From Jan 2012, we have moved to a [http://www.meetup.com/OWASP-Atlanta/ Meetup group]. Click on the following link to visit our meetup page.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-Atlanta/?a=shareimg http://img.meetup.com/img/logo_82.png]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Atlanta Georgia OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  (2011 &amp;amp; Before) ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz (Tony UV) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley (Tony UV]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10 (Tony UV)]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices (Tony UV)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122411</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122411"/>
				<updated>2012-01-05T20:39:57Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* January 2012 Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  1100 Abernathy Road, Bldg 500, Ste 200, Atlanta, GA 30328&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:  All RSVP is done now via our meetup.com site.  Visit and register at www.meetup.com/owasp-atlanta.'''&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122410</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=122410"/>
				<updated>2012-01-05T20:36:12Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Thank You to Our 2011 Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Dec 15th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2012 Supporters ==&lt;br /&gt;
&lt;br /&gt;
We're looking for sponsors in 2012.  Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2012. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  TBD&lt;br /&gt;
&amp;lt;!-- Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/ --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.15.11 | December 2011 - Preventing Data Breaches using Provenance-aware Firewalls (Anirudh Ramachandran, Nouvou Inc) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 11.17.11 | November 2011 - HowTo Talk on Assessing Mobile Apps ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120118</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120118"/>
				<updated>2011-11-14T18:42:17Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Nov 17th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2011 Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
===January 2012 Meeting===&lt;br /&gt;
'''WHAT::''' 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' January 19, 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120117</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120117"/>
				<updated>2011-11-14T18:37:36Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Thank You to Our 2011 Supporters */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Nov 17th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our 2011 Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' February 2012 Chapter Meeting - 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120116</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=120116"/>
				<updated>2011-11-14T18:30:12Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Nov 17th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table cellpadding=&amp;quot;15&amp;quot; cellspacing=&amp;quot;0&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
===February 2012 Meeting===&lt;br /&gt;
'''WHAT::''' February 2012 Chapter Meeting - 'Ninja Assessments: Stealth Security Testing for Organizations'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' February 2012. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Organizations today need to be able to easily integrate security testing &lt;br /&gt;
within their existing processes.  In this talk, Kevin Johnson of Secure Ideas&lt;br /&gt;
will explore various techniques and tools to help organizations assess the&lt;br /&gt;
security of the web applications.  These techniques are designed to be &lt;br /&gt;
implemented easily and with little impact on the work load of the staff.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===Google Calendar===&lt;br /&gt;
[https://www.google.com/calendar/embed?src=o5j6b323c225duhohd2uctcofk%40group.calendar.google.com&amp;amp;ctz=America/New_York&amp;amp;mode=AGENDA HTML] | &lt;br /&gt;
[https://www.google.com/calendar/ical/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic.ics ICAL] | &lt;br /&gt;
[https://www.google.com/calendar/feeds/o5j6b323c225duhohd2uctcofk%40group.calendar.google.com/public/basic XML]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Meetings  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119934</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119934"/>
				<updated>2011-11-09T05:21:36Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik Shauvik Choudhary] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119933</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119933"/>
				<updated>2011-11-09T05:20:05Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.27.11 | October 2011 - Fuzzin' w/ JBroFuzz ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Leader &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/User:Shauvik] - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Russell Eubanks - Chapter Lead&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119318</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119318"/>
				<updated>2011-10-18T19:53:20Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* December X 2011 Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===October 2011 Meeting===&lt;br /&gt;
'''WHAT::''' October Chapter Meeting - 'Fuzzin' w/ JBroFuzz'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 27th of October 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Your Chapter Lead - Tony UV.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
No slides, more show and tell on using JBroFuzz via a demo of the tool and the overall project efforts.  Will introduce both the concept of fuzzing, what it achieves, and how to get started with an OWASP project that is in stable release.  &lt;br /&gt;
&lt;br /&gt;
Will also talk about other projects of interest that YOU may be interested in participating in and even leading.&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Lead &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Sponsorships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cait O'Dell - Communications Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Partnerships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119317</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119317"/>
				<updated>2011-10-18T19:52:31Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* December X 2011 Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===October 2011 Meeting===&lt;br /&gt;
'''WHAT::''' October Chapter Meeting - 'Fuzzin' w/ JBroFuzz'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 27th of October 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Your Chapter Lead - Tony UV.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
No slides, more show and tell on using JBroFuzz via a demo of the tool and the overall project efforts.  Will introduce both the concept of fuzzing, what it achieves, and how to get started with an OWASP project that is in stable release.  &lt;br /&gt;
&lt;br /&gt;
Will also talk about other projects of interest that YOU may be interested in participating in and even leading.&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December X 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'Preventing Data Breaches using Provenance-aware Firewalls'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' Data breaches through Web application vulnerabilities have become&lt;br /&gt;
particularly rampant. Point solutions -- for example, a Web&lt;br /&gt;
Application Firewall that scans requests destined to the Web app --&lt;br /&gt;
can only stop a limited number of attack patterns, and do not provide&lt;br /&gt;
any protection from a breach once a vulnerability is eventually&lt;br /&gt;
exploited. We have developed a complementary approach to prevent&lt;br /&gt;
breaches based on the idea that, if sensitive data is tracked closely&lt;br /&gt;
enough, a breach can be prevented without worrying about the Web&lt;br /&gt;
application vulnerability that led to the breach.&lt;br /&gt;
&lt;br /&gt;
In this talk, I will present the architecture of SilverLine (associates tamper-proof tags with database&lt;br /&gt;
records and files, and uses an OS-level module to track the flow of&lt;br /&gt;
tagged data through the various components of a Web application) and&lt;br /&gt;
describe how we integrated SilverLine with a popular open source&lt;br /&gt;
e-Commerce Web application, OSCommerce. &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend. However, please look to join our chapter.  Only $50.  No pressure, but greatly appreciate. Non-profit and good cause.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Lead &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Sponsorships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cait O'Dell - Communications Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Partnerships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119125</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119125"/>
				<updated>2011-10-15T04:24:19Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* December X 2011 Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===October 2011 Meeting===&lt;br /&gt;
'''WHAT::''' October Chapter Meeting - 'Fuzzin' w/ JBroFuzz'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 27th of October 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Your Chapter Lead - Tony UV.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
No slides, more show and tell on using JBroFuzz via a demo of the tool and the overall project efforts.  Will introduce both the concept of fuzzing, what it achieves, and how to get started with an OWASP project that is in stable release.  &lt;br /&gt;
&lt;br /&gt;
Will also talk about other projects of interest that YOU may be interested in participating in and even leading.&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December X 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'TBD'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' TBD &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Lead &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Sponsorships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cait O'Dell - Communications Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Partnerships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119124</id>
		<title>Atlanta Georgia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Atlanta_Georgia&amp;diff=119124"/>
				<updated>2011-10-15T04:23:21Z</updated>
		
		<summary type="html">&lt;p&gt;Versprite: /* Future Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OwaspAtl.png]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Atlanta|extra=The chapter leader is [mailto:tonyuv@owasp.org Tony UcedaVelez]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Atlanta|emailarchives=http://lists.owasp.org/pipermail/owasp-Atlanta}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== '''Local News'''  ====&lt;br /&gt;
&lt;br /&gt;
== Latest News ==&lt;br /&gt;
So we have hit a bit of a lull over the past two months as you can probably tell. August meeting was really low attendance and September was a non-event since I largely have been out of town and so have a lot of the other co-leads.  Nonetheless, get ready to resume meetings.  Next one is Oct 27th at the Tilted Kilt @ Cumberland.  Make a note and check out details in the Chapter Meetings page above. &lt;br /&gt;
&lt;br /&gt;
FYI - We are trying to reach out to more developers, quality assurance engineers, and software architects so if you have colleagues in those areas, please invite them to come. For next meeting information, please visit the Chapter Meetings tab and RSVP in the link provided.&lt;br /&gt;
&lt;br /&gt;
== Staying in Touch ==&lt;br /&gt;
There is an OWASP Atlanta Linkedin Group. For those addicted to LinkedIn, we have a group you can further feed your addiction. The OWASP Atlanta Chapter. http://www.linkedin.com/groups?home=&amp;amp;amp;gid=1811960&amp;amp;amp;trk=anet_ug_hm &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Atlanta mailing list provides a low volume update to monthly events and also allows for members to post questions related to challenges in using and adopting OWASP related material/ tools. To join the Atlanta Mailing List, please sign up here: http://lists.owasp.org/mailman/listinfo/owasp-Atlanta&lt;br /&gt;
&lt;br /&gt;
== Becoming a Member or Sponsor ==&lt;br /&gt;
On behalf of the entire organization, I would like to solicit your financial support of our chapter via a tax deductible membership for OWASP as a great non-profit organization which aims to elevate web application security. We hope that you find historical and future meetings to be of value and show support via a member based contribution. &lt;br /&gt;
&lt;br /&gt;
To contribute to OWASP-Atlanta, sign up as an individual member, or support us as a corporate sponsor, please visit: http://www.owasp.org/index.php/Membership. If you are already a member, please don't forget to renew your membership!!  The same link will serve both purposes. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Thank You to Our Supporters ==&lt;br /&gt;
&lt;br /&gt;
Thanks to the following list of chapter level supporters for their financial contributions and/ or hosting our chapter meetings in 2011. &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:GTISC logo2.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:versprite.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:stachliu.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:whitehat.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:imperva.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:adp.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:iptrust.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:dellswrx.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;[[Image:accuvant.jpg]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2011 OWASP Atlanta Member Survey  ==&lt;br /&gt;
The Atlanta OWASP Member Survey has come and gone. Thanks to all those that responded. A subset of the results is shown below in the form of top ranking security topics that members wish to see in 2011. [[Image:Owasp surv2011.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== '''Future Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
===October 2011 Meeting===&lt;br /&gt;
'''WHAT::''' October Chapter Meeting - 'Fuzzin' w/ JBroFuzz'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 27th of October 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Your Chapter Lead - Tony UV.&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
No slides, more show and tell on using JBroFuzz via a demo of the tool and the overall project efforts.  Will introduce both the concept of fuzzing, what it achieves, and how to get started with an OWASP project that is in stable release.  &lt;br /&gt;
&lt;br /&gt;
Will also talk about other projects of interest that YOU may be interested in participating in and even leading.&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===November 2011 Meeting===&lt;br /&gt;
'''WHAT::''' November Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 17th of November 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Jeremy Allen is the Chief Technology Officer with the Intrepidus Group. Jeremy is a regular speaker at popular security conferences such as BlackHat, SOURCE and OWASP AppSec. He is currently the lead on the development of the SANS “Secure Mobile Application Development: iOS App Security”  course. He has conducted numerous application assessments against iOS applications. &lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::'''&lt;br /&gt;
This talk will focus on mobile application assessment techniques. The assessment techniques will focus on how to test applications for the OWASP Mobile Top 10 issues. Mitigation techniques for both Android and iOS will be discussed. Mallory, Intrepidus Group’s Man in The Middle tool designed to test mobile devices and applications, will be demonstrated throughout the presentation. Additionally, usage of other open source tools will be demonstrated. Both iOS and Android will be discussed.  &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===December X 2011 Meeting===&lt;br /&gt;
'''WHAT::''' December Chapter Meeting - 'HowTo Talk on Assessing Mobile Apps'&lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' 15th of December 2011. 6-8pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Cumberland Pkwy Tilted Kilt http://atlanta-cumberland.tiltedkilt.com/&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' Anirudh Ramachandran is a networks and systems security&lt;br /&gt;
researcher at Georgia Tech and the founder and CTO of Nouvou Inc., a&lt;br /&gt;
nascent data security startup. He has 6 years of experience developing&lt;br /&gt;
solutions in areas such as data breach prevention, high speed traffic&lt;br /&gt;
monitoring, network-level spam filtering, and botnet identification.&lt;br /&gt;
He graduated with a PhD in Computer Science from Georgia Tech in 2011.&lt;br /&gt;
http://www.cc.gatech.edu/~avr&lt;br /&gt;
&lt;br /&gt;
'''ABSTRACT::''' TBD &lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
===XXX 2011 Meeting===&lt;br /&gt;
'''WHAT::''' XXX Chapter Meeting - &lt;br /&gt;
&lt;br /&gt;
'''WHEN::''' XXth March 2011. 7-9pm&lt;br /&gt;
&lt;br /&gt;
'''WHERE::'''  Tilted Kilt http://tinyurl.com/4oh2thj&lt;br /&gt;
&lt;br /&gt;
'''WHO::''' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP::''' TBD&lt;br /&gt;
&lt;br /&gt;
'''''COST''''': Free to all.  Bring a Friend.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== &amp;quot;Past Meetings&amp;quot;  ==&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.18.11 | August 2011 - Mobile Security for the Enterprise (Billy Graham) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.25.11 | May 2011 - Don't Teach Your Developers Security (Caleb Sima, Armorize) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.21.11 | Apr 2011 - Demystifying WAFs (members from Imperva, Accuvant, WhiteHat Security Presenting) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.17.11 | Mar 2011 - Online Privacy (Samy Kamkar) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.28.11 | Feb 2011 - Separated by a Common Language (Business-Geek Communication) ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.27.11 | Jan 2011 - OWASP Tool Medley ]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 12.16.10 | Dec 2010 - December Social Event]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.10 | Oct 2010 - Rapid Development of Web Security Tools using SpiderSense]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.10 | Sep 2010 - Search Engine Hacking]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.12.10 | Aug 2010 - OWASP Guided Tour &amp;amp; Using the O2 Platform]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.26.10 | Jun 2010 - Security Six Flags Outing]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 05.24.10 | May 2010 - Clubbing WebApps with Botnets]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 03.24.10 | Mar 2010 - Panel on Static &amp;amp; Dynamic Analysis for Web Apps]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.25.10 | Feb 2010 - Embedded Malicious JavaScript]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 02.15.10 | Feb 2010 - DNS Security]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 01.29.10 | Jan 2010 - Owasp Top 10]]&lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 10.13.09 | Oct 2009 - Security Religions &amp;amp; Risk Windows (Jeremiah Grossman)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 09.15.09 | Sept 2009 - Securing WebServices]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 08.17.09 | Aug 2009 - ISSA Event]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 06.03.09 | June 2009 - OWASP LIVE CD Workshop]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.25.09 | Apr 2009 - Filter Evasion Techniques (Workshop)]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Member Meeting 04.02.09 | Apr 2009 - Chapter Rebirth meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta ISACA OWASP Meeting 03.27.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 03.05.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta Leadership Meeting 02.26.09]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP May 2007 Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP December 06 Social]] &lt;br /&gt;
&lt;br /&gt;
[[Atlanta OWASP April Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[Chapter Meeting March 29th 2006]] &lt;br /&gt;
&lt;br /&gt;
[[October 26th Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[April 27th, Chapter meeting a SUCCESS!]] &lt;br /&gt;
&lt;br /&gt;
[[March 30th, 2005]] &lt;br /&gt;
&lt;br /&gt;
[[February Meeting]] &lt;br /&gt;
&lt;br /&gt;
[[June 2005]] &lt;br /&gt;
&lt;br /&gt;
==== Atlanta Georgia OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.owasp.org/index.php/User:Versprite Tony UcedaVelez] - Chapter Lead &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Steven Schwartz - Sponsorships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cait O'Dell - Communications Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Jon Bango - Partnerships Chairperson &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Georgia]]&lt;/div&gt;</summary>
		<author><name>Versprite</name></author>	</entry>

	</feed>