<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wayne+huang</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wayne+huang"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Wayne_huang"/>
		<updated>2026-05-02T16:06:44Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_2&amp;diff=75702</id>
		<title>OWASP Connections Committee - Application 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_2&amp;diff=75702"/>
				<updated>2010-01-05T00:55:32Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Robert Hansen&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | List here.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Connection Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Mano Paul&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Global Education Committee, OWASP&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Robert Hansen (RSnake) needs no introduction to those in the web application security world. His contributions to the world of security is commendable and for him to be part of the OWASP Connection Committee is a natural fit, one that I believe will be mutually beneficial. His background will undoubtedly be a value add to achieving the goals and objectives of the OWASP Connections committee. RSnake has my highest recommendation.&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | James Wickett&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Chapter President, Austin OWASP&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Robert has been a valuable asset to the Austin OWASP chapter and would be a great person to be on the OWASP Connection Committee. &amp;amp;nbsp;He has been instrumental in helping our chapter implement new events that help build community and integrate people socially in the group.&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Josh Sokol&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter President, Austin OWASP&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Robert has been working with the Austin OWASP Chapter board members for the past couple of years and has provided immeasurable assistance to the chapter in drumming up membership, getting top-notch presenters, and generally supporting our activities.  He is a stand up person and is amongst the smartest security people I know.  I think he would be an excellent fit for the OWASP Connections Committee role and he has my highest recommendation for this position.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Wayne Huang &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |Global Conferences Committee, OWASP&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |As Manu said it--Robert needs no introduction to those in the web application security world. I believe Robert will be an important asset to OWASP. Robert came to Taipei to support OWASP Asia 2008. We all know how hard it is to get good speakers to fly out to this region. Robert was willing to support on quite a short notice, and provided valuable suggestions in the Asia chapter leader's meeting. I felt Robert knows exactly how he can contribute in an organization such as OWASP, and his experiences and connections will be highly valuable to us. With his knowledge, expertise, and devotion, and his very direct and straight way of communication, he has earned his respect in the security community. I strongly recommend him for this position.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43462</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43462"/>
				<updated>2008-10-17T02:15:15Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
== Conference T-Shirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;br /&gt;
&lt;br /&gt;
== Conference Location ==&lt;br /&gt;
&lt;br /&gt;
'''NTUH International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No. 2, Xuzhou Road, Zhongzheng District 101, Taipei City&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/index.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/about04.htm Map and transport Information]'''&lt;br /&gt;
&lt;br /&gt;
== Welcome to Taiwan==&lt;br /&gt;
And WELCOME TO TAIWAN! Please check out [http://tw.youtube.com/watch?v=wRc0q9xQEQ4 this video] about interesting places in Taiwan.&lt;br /&gt;
If you need suggestions on how to plan out your trip, please feel free to [mailto:wayne.owasp@gmail.com '''contact us!''']&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43370</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43370"/>
				<updated>2008-10-15T00:49:55Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email a Speaker Agreement to each presenter and make sure they reply their consents; you can modify from the standard OWASP [[Speaker Agreement]]. Note that the standard agreement implies you will be providing the presenters with a Powerpoint template. A startdard OWASP Powerpoint template is [[Media:Presentation_template.ppt | available here]]. You are free to modify the standard speaker agreement and the Powerpoint template, but make sure you have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Design Components''' ==&lt;br /&gt;
&lt;br /&gt;
In designing your own Powerpoint templates, tshirts, bags, badges, banners, flags, carpets and what have you, find the original vector graphic of the OWASP logo (in EPS and AI formats) [[Media:OWASP_Logo.zip | here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Conference Organizer's Kit''' ===&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
'''Overall OWASP Conferences Chair''' is ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
* Stadard [[Speaker Agreement]]&lt;br /&gt;
* [[Media:Presentation_template.ppt | Standard Powerpoint template]]&lt;br /&gt;
* Slides should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
* Original vector graphic of the OWASP logo (in EPS and AI formats) [[Media:OWASP_Logo.zip | here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43369</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43369"/>
				<updated>2008-10-15T00:45:33Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* '''Design Components''' */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email a Speaker Agreement to each presenter and make sure they reply their consents; you can modify from the standard OWASP [[Speaker Agreement]]. Note that the standard agreement implies you will be providing the presenters with a Powerpoint template. A startdard OWASP Powerpoint template is [[Media:Presentation_template.ppt | available here]]. You are free to modify the standard speaker agreement and the Powerpoint template, but make sure you have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Design Components''' ==&lt;br /&gt;
&lt;br /&gt;
In designing your own Powerpoint templates, tshirts, bags, badges, banners, flags, carpets and what have you, find the original vector graphic of the OWASP logo (in EPS and AI formats) [[Media:OWASP_Logo.zip | here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43368</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43368"/>
				<updated>2008-10-15T00:43:56Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* '''Design Components''' */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email a Speaker Agreement to each presenter and make sure they reply their consents; you can modify from the standard OWASP [[Speaker Agreement]]. Note that the standard agreement implies you will be providing the presenters with a Powerpoint template. A startdard OWASP Powerpoint template is [[Media:Presentation_template.ppt | available here]]. You are free to modify the standard speaker agreement and the Powerpoint template, but make sure you have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Design Components''' ==&lt;br /&gt;
&lt;br /&gt;
In designing your own Powerpoint templates, tshirts, bags, badges, banners, flags, carpets and what have you, find the original vector graphic of the OWASP logo (in EPS and AI formats) [[image:OWASP_Logo.zip|here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43367</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43367"/>
				<updated>2008-10-15T00:43:12Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email a Speaker Agreement to each presenter and make sure they reply their consents; you can modify from the standard OWASP [[Speaker Agreement]]. Note that the standard agreement implies you will be providing the presenters with a Powerpoint template. A startdard OWASP Powerpoint template is [[Media:Presentation_template.ppt | available here]]. You are free to modify the standard speaker agreement and the Powerpoint template, but make sure you have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Design Components''' ==&lt;br /&gt;
&lt;br /&gt;
In designing your own Powerpoint templates, tshirts, bags, badges, banners, flags, carpets and what have you, find the original vector graphic of the OWASP logo (in EPS and AI formats) [[http://www.owasp.org/images/2/28/OWASP_Logo.zip|here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43366</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43366"/>
				<updated>2008-10-15T00:37:56Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* '''Presenters and Presentations''' */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email a Speaker Agreement to each presenter and make sure they reply their consents; you can modify from the standard OWASP [[Speaker Agreement]]. Note that the standard agreement implies you will be providing the presenters with a Powerpoint template. A startdard OWASP Powerpoint template is [[Media:Presentation_template.ppt | available here]]. You are free to modify the standard speaker agreement and the Powerpoint template, but make sure you have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43242</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43242"/>
				<updated>2008-10-14T03:57:58Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Conference Location ==&lt;br /&gt;
&lt;br /&gt;
'''NTUH International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No. 2, Xuzhou Road, Zhongzheng District 101, Taipei City&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/index.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/about04.htm Map and transport Information]'''&lt;br /&gt;
&lt;br /&gt;
== Conference Tshirt ==&lt;br /&gt;
[[Image:OWAS AppSec Asia Tshirt.png]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWAS_AppSec_Asia_Tshirt.png&amp;diff=43241</id>
		<title>File:OWAS AppSec Asia Tshirt.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWAS_AppSec_Asia_Tshirt.png&amp;diff=43241"/>
				<updated>2008-10-14T03:56:33Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43224</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43224"/>
				<updated>2008-10-14T00:33:14Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Conference Location ==&lt;br /&gt;
&lt;br /&gt;
'''NTUH International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No. 2, Xuzhou Road, Zhongzheng District 101, Taipei City&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/index.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/about04.htm Map and transport Information]'''&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=YM_Chen,_Director,_Foundstone,_A_Division_of_McAfee&amp;diff=43222</id>
		<title>YM Chen, Director, Foundstone, A Division of McAfee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=YM_Chen,_Director,_Foundstone,_A_Division_of_McAfee&amp;diff=43222"/>
				<updated>2008-10-14T00:31:57Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: YM Chen, Director, McAfee Foundstone moved to YM Chen, Director, Foundstone, A Division of McAfee&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''YM Chen'''&lt;br /&gt;
&lt;br /&gt;
Yen-Ming joined Foundstone as a consultant in 2000 and is now a Director. In client engagements, Yen-Ming helps clients align their security strategies with their business goals. Yen-Ming established the first Foundstone Asian Pacific office in Singapore. He has been instrumental in developing and growing new markets like China, Hong Kong, Singapore, Indonesia, and Saudi Arabia. He has also managed regional distributors and resellers of the Foundstone vulnerability scanner and helped them increase regional sales revenues. In addition, he served as a Lead Instructor for Foundstone’s Ultimate Hacking, Ultimate Hacking Expert, Ultimate Web Hacking and Ultimate Hacking: Incident Response classes.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Foundstone, Yen-Ming worked in the CyberSecurity Center at Carnegie Mellon University. He created the prototype for an intrusion detection system appliance and wrote the first intrusion detection log correlation and analysis program, snort-stat for Snort.&lt;br /&gt;
&lt;br /&gt;
Yen-Ming is a published author and sought-after speaker in both North America and the Pacific Rim. His articles have been published by SecurityFocus, SysAdmin, UnixReview, DevX, PCWeek, CNET Taiwan, ITHome, and other technology magazines in both North America and Asia Pacific. Yen-Ming has been interviewed by BBC and other media across the globe, and he has been a featured presenter at conferences, including PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, APAC Regional Conference on Electronic Safety and Soundness for Financial Services, Hong Kong CERT, and ICST conferences. Yen-Ming has contributed to several books, including: Hacking Exposed, 3rd ed., Hacking Exposed for Web Applications, Windows XP Professional Security, and HackNotes: Web Application Security.&lt;br /&gt;
&lt;br /&gt;
Yen-Ming is currently a professional member of ACM and he previous held Certified Information Systems Security Professional (2001-2004) and Microsoft Certified Systems Engineer. Yen-Ming holds a BS in mathematics from National Central University in Taiwan, and an MS in information networking from Carnegie Mellon University.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=YM_Chen,_Director,_McAfee_Foundstone&amp;diff=43223</id>
		<title>YM Chen, Director, McAfee Foundstone</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=YM_Chen,_Director,_McAfee_Foundstone&amp;diff=43223"/>
				<updated>2008-10-14T00:31:57Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: YM Chen, Director, McAfee Foundstone moved to YM Chen, Director, Foundstone, A Division of McAfee&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[YM Chen, Director, Foundstone, A Division of McAfee]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43221</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43221"/>
				<updated>2008-10-14T00:30:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: Undo revision 43220 by Wayne huang (Talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone | YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Conference Location ==&lt;br /&gt;
&lt;br /&gt;
'''NTUH International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No. 2, Xuzhou Road, Zhongzheng District 101, Taipei City&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/index.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/about04.htm Map and transport Information]'''&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43220</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=43220"/>
				<updated>2008-10-14T00:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simultaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Map2.png|center]]&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, Foundstone, A Division of McAfee]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Conference Location ==&lt;br /&gt;
&lt;br /&gt;
'''NTUH International Convention Center'''&lt;br /&gt;
&lt;br /&gt;
'''Address:''' No. 2, Xuzhou Road, Zhongzheng District 101, Taipei City&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/index.htm Website]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.thcc.net.tw/en/about04.htm Map and transport Information]'''&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43027</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=43027"/>
				<updated>2008-10-12T19:35:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HAVE A CONFERENCE! ==&lt;br /&gt;
'''&lt;br /&gt;
Now what?  Read on for some helpful guidelines to assist you in putting together the perfect conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Preamble''' ==&lt;br /&gt;
&lt;br /&gt;
Our intent in posting the guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host a conference. I've also included some issues that arise only at the larger conferences. We’ve left the comments mixed together so you can use what you need and to appreciate what you don't have to use.&lt;br /&gt;
&lt;br /&gt;
We’ve also prepared a [Conference Planning Table] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
&lt;br /&gt;
''Finally, make sure to utilize the resources at the end of the page to help facilitate your event.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''General''' ==&lt;br /&gt;
&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Permission''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may be required to have OWASP permission before hosting a conference. Even if not required, it's important to talk with OWASP Board before committing to host a conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Set a Date''' ==&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to schedule a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP calendar to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Organize''' ==&lt;br /&gt;
&lt;br /&gt;
Organize a conference committee as early as possible. &lt;br /&gt;
&lt;br /&gt;
Communicate regularly with the OWASP leadership. There's lots of history that you can use to your advantage such as format, what works and what doesn't, etc. Also, remember that you're the host, but it's not your conference; you should be working with them (the organization's leadership) to meet their objectives.&lt;br /&gt;
&lt;br /&gt;
Establish regular planning/reporting meetings. Set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Reserve Rooms''' ==&lt;br /&gt;
&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration.&lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Program''' ==&lt;br /&gt;
&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Presenters and Presentations''' ==&lt;br /&gt;
&lt;br /&gt;
Make sure every presenter knows rules enforced by OWASP Conferences. Email the OWASP [[Speaker Agreement]] to each presenter and make sure they reply their consents. Note that the agreement implies you will be providing the presenters with a Powerpoint template. A startdard template is [[Media:Presentation_template.ppt | available here]]. If you wish to make your modifications, you must have it approved by the '''Overall OWASP Conferences Chair''' ([mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security).&lt;br /&gt;
&lt;br /&gt;
Also note that according to the OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Promotions''' ==&lt;br /&gt;
&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. Post the date and location on the OWASP web site. If you have the expertise and resources, you should consider setting up your own conference wiki page for up-to-date information, on-line registration, proposal submissions, etc.  Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Housing''' ==&lt;br /&gt;
&lt;br /&gt;
Estimate the number of people you think might attend (review previous conference attendance) and make arrangements accordingly. In addition to blocking some rooms at a local motel/hotel consider economy lodging (dorms, conference centers, etc., if available), for those who prefer that kind of housing.&lt;br /&gt;
&lt;br /&gt;
When making reservations with local hotels, negotiate other amenities if possible such as shuttle services (from airports, to conference sessions).&lt;br /&gt;
&lt;br /&gt;
Be careful to avoid making reservations that require guarantees or other financial obligations. In fact, it's best to let the housing/hotel organization handle their own reservations and billing. Find out how long reservations can be held, cancellation deadlines, etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Travel''' ==&lt;br /&gt;
&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Food''' ==&lt;br /&gt;
&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front.&lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. Your own college may be willing to sponsor one such event. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements.&lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not.&lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway.&lt;br /&gt;
&lt;br /&gt;
If you do have group meals, be sure to allow for special dietary considerations. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Management Tools''' ==&lt;br /&gt;
&lt;br /&gt;
Larger, OWASP lead conferences can be processed through the Cvent system. For smaller conferences (less than 50 people) an Excel spreadsheet should work fine to manage registrants.  If you would like the OWASP office to manage registration for you, please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to set up your on-line registration process.&lt;br /&gt;
&lt;br /&gt;
== '''Money''' ==&lt;br /&gt;
&lt;br /&gt;
Before sending out the conference brochure/announcement, you must determine a conference registration fee. On the one hand, you want to cover your costs. But on the other, you want to keep the costs low so that as many people as possible can afford to come. Try to find a balance between providing the amenities, and keeping costs down. Be sure to include the following costs: Publicity (brochure, printing, mailing), speaker fees or accommodations, facilities (equipment rentals), transportation, meals (snacks, meals), conference materials (packets, name tags, etc.) &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
A special account can be set up through OWASP just for your conference. You can use this account to process sponsorship, donations, manage expenses, and help you keep tabs on vendor costs.  Again, contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up.&lt;br /&gt;
&lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Vendor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
An exhibit hall must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Equipment and Support''' ==&lt;br /&gt;
&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility.&lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. Then when you confirm conference presentations, ask presenters to provide you with a list of equipment they need. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Entertainment''' ==&lt;br /&gt;
&lt;br /&gt;
Depending on the size and scope of the conference, you may need to provide for one or more social activities for attendees.&lt;br /&gt;
&lt;br /&gt;
At smaller conferences, organized dinners at local restaurants can be enjoyable. For larger conferences, a banquet may be in order. At the very least, provide a list of recommended local eateries for those who want to venture out on their own.&lt;br /&gt;
&lt;br /&gt;
You should also consider whether your locale has something uniquely interesting to offer. If feasible, you could organize a group outing to a play, local site, etc. Be sure to determine whether costs are included in the registration, or if it is to be a separate (and therefore optional) cost.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
== Helpful links ==&lt;br /&gt;
'''&lt;br /&gt;
[[Conference Planning Timeline]]&lt;br /&gt;
&lt;br /&gt;
[[Speaker Template]]&lt;br /&gt;
&lt;br /&gt;
[[Sponsor information]]&lt;br /&gt;
&lt;br /&gt;
[[Suggestions for wiki]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42686</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42686"/>
				<updated>2008-10-09T02:41:54Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Upcoming Conferences */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors|here]].&lt;br /&gt;
&lt;br /&gt;
==Current Schedule==&lt;br /&gt;
OWASP launched its OWASP AppSec conferences series in 2004 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. If you'd like to host a conference, we're always looking for great locations and enthusiastic local organizers. Please contact [[User:Wichers|Dave Wichers]], the OWASP Conferences Chair at dave.wichers 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
===Upcoming Conferences===&lt;br /&gt;
; May 2009 - OWASP AppSec Europe 2009 - Poland&lt;br /&gt;
: May 11th - 14th - Conference and Training, Qubus Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - OWASP Front Range Conference&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - OWASP AppSec Australia 2009 - Gold Coast&lt;br /&gt;
: Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
===Previous Conferences===&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Pace University, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[6th OWASP AppSec Conference - Italy 2007 | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
== 2004-2006 ==&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
==Other Events==&lt;br /&gt;
The following lists other events that OWASP members have heavily participated in, and presented about OWASP or on OWASP Projects:&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [http://www.owasp.org/index.php/Front_Range_Web_Application_Security_Summit_Planning_Page Front Range Web Application Security Conference] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
;March 12-14 2008 - [http://sourceboston.com/ SOURCE Boston 2008][http://sourceboston.com/ [[image:Logo.JPG|100px]]]  &lt;br /&gt;
: Boston's first security conference features a series of panels, keynotes and networking events divided into three distinct tracks; business, technology and web app sec.  This conference has been organized by former members of @Stake, L0pht, NSA, as well as current members of OWASP and Veracode.&lt;br /&gt;
:A Few Highlights:&lt;br /&gt;
:* L0pht reunion and panel discussion&lt;br /&gt;
:* Richard Clarke&lt;br /&gt;
:* Dan Geer&lt;br /&gt;
:* Stephen Levy&lt;br /&gt;
:* Jeremiah Grossman &lt;br /&gt;
&lt;br /&gt;
; Jan 14 2008 - [https://www.owasp.org/index.php/Minneapolis_St_Paul Bruce Schneier - The Economics of Information Security]&lt;br /&gt;
&lt;br /&gt;
; November 22, 2007 - OWASP Presentations at InfoSecurity Paris 2007&lt;br /&gt;
: Sebastien GIORIA from French Chapter will introduce a table workshop about WebServices and Web Security.&lt;br /&gt;
&lt;br /&gt;
; October 3-4, 2007 - [http://www.RochesterSecurity.org/ Rochester Security Summit 2007]&lt;br /&gt;
: Rochester OWASP Chapter partners with Rochester Security Summit &lt;br /&gt;
: Includes several OWASP and Web App Sec presentations:&lt;br /&gt;
:* Rohyt Belani of Intrepidus Group - Phishing 2.0: Beyond Identity Theft&lt;br /&gt;
:* Andrea Cogliati - Security in Software Development Life Cycle (SDLC)&lt;br /&gt;
:* Ralph Durkee - 2007 OWASP Top 10 &amp;amp; Live Web Application Attacks&lt;br /&gt;
:* James Kist - Cross Site Scripting Attacks and Defenses&lt;br /&gt;
&lt;br /&gt;
; February 2007 - [[InfoSecurity Milano 2007|OWASP Presentations at InfoSecurity Milan 2007]]&lt;br /&gt;
: Dave Wichers from the OWASP Foundation presented the new OWASP Top 10 2007 release. Members of the OWASP Italy Chapter presented a number of other presentations.&lt;br /&gt;
&lt;br /&gt;
==Papers==&lt;br /&gt;
If you're interested in presenting at a future conference, please contact OWASP at: conferences 'at' owasp.org. If you're interested in submitting a paper to the refereed papers track for the next U.S. or European conference, please contact Frank Piessens, the OWASP Conferences Refereed Papers Chair: Frank.Piessens 'at' cs.kuleuven.ac.be.&lt;br /&gt;
&lt;br /&gt;
==Conference Guidelines==&lt;br /&gt;
Chapter leaders wanting to host a conference click [[How_to_Host_a_Conference|here]].&lt;br /&gt;
&lt;br /&gt;
Sponsors and potential sponsors click [[Speaker_Agreement|here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Leaders==&lt;br /&gt;
OWASP Conferences Chair: [mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security.&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Refereed Papers Chair: [mailto:frank.piessens@cs.kuleuven.ac.be Frank Piessens], KU Leuven.&lt;br /&gt;
&lt;br /&gt;
==Conference Project Sponsors== &lt;br /&gt;
The OWASP Conferences project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif] and &lt;br /&gt;
[http://www.kuleuven.be/english https://www.owasp.org/images/9/97/Kuleuven.jpg]&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
The 7th OWASP AppSec Conference held in San Jose, CA in Nov 2007 was sponsored by:&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Conference_Sponsors_2007_San_Jose}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- __NOTOC__ --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sponsor a Conference==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;an OWASP Conference&amp;lt;/paypal&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42684</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42684"/>
				<updated>2008-10-09T02:40:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: OWASP AppSec Asia 2008 moved to OWASP AppSec Asia 2008 - Taiwan: add location of conference&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_AppSec_Asia_2008_Map_Design.png|center]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008&amp;diff=42685</id>
		<title>OWASP AppSec Asia 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008&amp;diff=42685"/>
				<updated>2008-10-09T02:40:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: OWASP AppSec Asia 2008 moved to OWASP AppSec Asia 2008 - Taiwan: add location of conference&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[OWASP AppSec Asia 2008 - Taiwan]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42593</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42593"/>
				<updated>2008-10-08T18:22:11Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Frank_Fan%2C_OWASP_China Frank Fan], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM] &amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_AppSec_Asia_2008_Map_Design.png|center]]&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_AppSec_Asia_2008_Map_Design.png&amp;diff=42592</id>
		<title>File:OWASP AppSec Asia 2008 Map Design.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_AppSec_Asia_2008_Map_Design.png&amp;diff=42592"/>
				<updated>2008-10-08T18:19:50Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42591</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42591"/>
				<updated>2008-10-08T18:11:07Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Upcoming Conferences */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors|here]].&lt;br /&gt;
&lt;br /&gt;
==Current Schedule==&lt;br /&gt;
OWASP launched its OWASP AppSec conferences series in 2004 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. If you'd like to host a conference, we're always looking for great locations and enthusiastic local organizers. Please contact [[User:Wichers|Dave Wichers]], the OWASP Conferences Chair at dave.wichers 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
===Upcoming Conferences===&lt;br /&gt;
; May 2009 - OWASP AppSec Europe 2009 - Poland&lt;br /&gt;
: May 11th - 14th - Conference and Training, Qubus Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - OWASP Front Range Conference&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - OWASP AppSec Australia 2009 - Gold Coast&lt;br /&gt;
: Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 | OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
===Previous Conferences===&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Pace University, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[6th OWASP AppSec Conference - Italy 2007 | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
== 2004-2006 ==&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
==Other Events==&lt;br /&gt;
The following lists other events that OWASP members have heavily participated in, and presented about OWASP or on OWASP Projects:&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [http://www.owasp.org/index.php/Front_Range_Web_Application_Security_Summit_Planning_Page Front Range Web Application Security Conference] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
;March 12-14 2008 - [http://sourceboston.com/ SOURCE Boston 2008][http://sourceboston.com/ [[image:Logo.JPG|100px]]]  &lt;br /&gt;
: Boston's first security conference features a series of panels, keynotes and networking events divided into three distinct tracks; business, technology and web app sec.  This conference has been organized by former members of @Stake, L0pht, NSA, as well as current members of OWASP and Veracode.&lt;br /&gt;
:A Few Highlights:&lt;br /&gt;
:* L0pht reunion and panel discussion&lt;br /&gt;
:* Richard Clarke&lt;br /&gt;
:* Dan Geer&lt;br /&gt;
:* Stephen Levy&lt;br /&gt;
:* Jeremiah Grossman &lt;br /&gt;
&lt;br /&gt;
; Jan 14 2008 - [https://www.owasp.org/index.php/Minneapolis_St_Paul Bruce Schneier - The Economics of Information Security]&lt;br /&gt;
&lt;br /&gt;
; November 22, 2007 - OWASP Presentations at InfoSecurity Paris 2007&lt;br /&gt;
: Sebastien GIORIA from French Chapter will introduce a table workshop about WebServices and Web Security.&lt;br /&gt;
&lt;br /&gt;
; October 3-4, 2007 - [http://www.RochesterSecurity.org/ Rochester Security Summit 2007]&lt;br /&gt;
: Rochester OWASP Chapter partners with Rochester Security Summit &lt;br /&gt;
: Includes several OWASP and Web App Sec presentations:&lt;br /&gt;
:* Rohyt Belani of Intrepidus Group - Phishing 2.0: Beyond Identity Theft&lt;br /&gt;
:* Andrea Cogliati - Security in Software Development Life Cycle (SDLC)&lt;br /&gt;
:* Ralph Durkee - 2007 OWASP Top 10 &amp;amp; Live Web Application Attacks&lt;br /&gt;
:* James Kist - Cross Site Scripting Attacks and Defenses&lt;br /&gt;
&lt;br /&gt;
; February 2007 - [[InfoSecurity Milano 2007|OWASP Presentations at InfoSecurity Milan 2007]]&lt;br /&gt;
: Dave Wichers from the OWASP Foundation presented the new OWASP Top 10 2007 release. Members of the OWASP Italy Chapter presented a number of other presentations.&lt;br /&gt;
&lt;br /&gt;
==Papers==&lt;br /&gt;
If you're interested in presenting at a future conference, please contact OWASP at: conferences 'at' owasp.org. If you're interested in submitting a paper to the refereed papers track for the next U.S. or European conference, please contact Frank Piessens, the OWASP Conferences Refereed Papers Chair: Frank.Piessens 'at' cs.kuleuven.ac.be.&lt;br /&gt;
&lt;br /&gt;
==Conference Guidelines==&lt;br /&gt;
Chapter leaders wanting to host a conference click [[How_to_Host_a_Conference|here]].&lt;br /&gt;
&lt;br /&gt;
Sponsors and potential sponsors click [[Speaker_Agreement|here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Leaders==&lt;br /&gt;
OWASP Conferences Chair: [mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security.&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Refereed Papers Chair: [mailto:frank.piessens@cs.kuleuven.ac.be Frank Piessens], KU Leuven.&lt;br /&gt;
&lt;br /&gt;
==Conference Project Sponsors== &lt;br /&gt;
The OWASP Conferences project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif] and &lt;br /&gt;
[http://www.kuleuven.be/english https://www.owasp.org/images/9/97/Kuleuven.jpg]&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
The 7th OWASP AppSec Conference held in San Jose, CA in Nov 2007 was sponsored by:&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Conference_Sponsors_2007_San_Jose}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- __NOTOC__ --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sponsor a Conference==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;an OWASP Conference&amp;lt;/paypal&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42590</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=42590"/>
				<updated>2008-10-08T18:09:38Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Upcoming Conferences */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors|here]].&lt;br /&gt;
&lt;br /&gt;
==Current Schedule==&lt;br /&gt;
OWASP launched its OWASP AppSec conferences series in 2004 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. If you'd like to host a conference, we're always looking for great locations and enthusiastic local organizers. Please contact [[User:Wichers|Dave Wichers]], the OWASP Conferences Chair at dave.wichers 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
===Upcoming Conferences===&lt;br /&gt;
; May 2009 - OWASP AppSec Europe 2009 - Poland&lt;br /&gt;
: May 11th - 14th - Conference and Training, Qubus Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - OWASP Front Range Conference&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - OWASP AppSec Australia 2009 - Gold Coast&lt;br /&gt;
: Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
===Previous Conferences===&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Pace University, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
== 2007 ==&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[6th OWASP AppSec Conference - Italy 2007 | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[6th_OWASP_AppSec_Conference_-_Italy_2007/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
== 2004-2006 ==&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
==Other Events==&lt;br /&gt;
The following lists other events that OWASP members have heavily participated in, and presented about OWASP or on OWASP Projects:&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [http://www.owasp.org/index.php/Front_Range_Web_Application_Security_Summit_Planning_Page Front Range Web Application Security Conference] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
;March 12-14 2008 - [http://sourceboston.com/ SOURCE Boston 2008][http://sourceboston.com/ [[image:Logo.JPG|100px]]]  &lt;br /&gt;
: Boston's first security conference features a series of panels, keynotes and networking events divided into three distinct tracks; business, technology and web app sec.  This conference has been organized by former members of @Stake, L0pht, NSA, as well as current members of OWASP and Veracode.&lt;br /&gt;
:A Few Highlights:&lt;br /&gt;
:* L0pht reunion and panel discussion&lt;br /&gt;
:* Richard Clarke&lt;br /&gt;
:* Dan Geer&lt;br /&gt;
:* Stephen Levy&lt;br /&gt;
:* Jeremiah Grossman &lt;br /&gt;
&lt;br /&gt;
; Jan 14 2008 - [https://www.owasp.org/index.php/Minneapolis_St_Paul Bruce Schneier - The Economics of Information Security]&lt;br /&gt;
&lt;br /&gt;
; November 22, 2007 - OWASP Presentations at InfoSecurity Paris 2007&lt;br /&gt;
: Sebastien GIORIA from French Chapter will introduce a table workshop about WebServices and Web Security.&lt;br /&gt;
&lt;br /&gt;
; October 3-4, 2007 - [http://www.RochesterSecurity.org/ Rochester Security Summit 2007]&lt;br /&gt;
: Rochester OWASP Chapter partners with Rochester Security Summit &lt;br /&gt;
: Includes several OWASP and Web App Sec presentations:&lt;br /&gt;
:* Rohyt Belani of Intrepidus Group - Phishing 2.0: Beyond Identity Theft&lt;br /&gt;
:* Andrea Cogliati - Security in Software Development Life Cycle (SDLC)&lt;br /&gt;
:* Ralph Durkee - 2007 OWASP Top 10 &amp;amp; Live Web Application Attacks&lt;br /&gt;
:* James Kist - Cross Site Scripting Attacks and Defenses&lt;br /&gt;
&lt;br /&gt;
; February 2007 - [[InfoSecurity Milano 2007|OWASP Presentations at InfoSecurity Milan 2007]]&lt;br /&gt;
: Dave Wichers from the OWASP Foundation presented the new OWASP Top 10 2007 release. Members of the OWASP Italy Chapter presented a number of other presentations.&lt;br /&gt;
&lt;br /&gt;
==Papers==&lt;br /&gt;
If you're interested in presenting at a future conference, please contact OWASP at: conferences 'at' owasp.org. If you're interested in submitting a paper to the refereed papers track for the next U.S. or European conference, please contact Frank Piessens, the OWASP Conferences Refereed Papers Chair: Frank.Piessens 'at' cs.kuleuven.ac.be.&lt;br /&gt;
&lt;br /&gt;
==Conference Guidelines==&lt;br /&gt;
Chapter leaders wanting to host a conference click [[How_to_Host_a_Conference|here]].&lt;br /&gt;
&lt;br /&gt;
Sponsors and potential sponsors click [[Speaker_Agreement|here]].&lt;br /&gt;
&lt;br /&gt;
==Conference Leaders==&lt;br /&gt;
OWASP Conferences Chair: [mailto:dave.wichers@owasp.org Dave Wichers], Aspect Security.&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Refereed Papers Chair: [mailto:frank.piessens@cs.kuleuven.ac.be Frank Piessens], KU Leuven.&lt;br /&gt;
&lt;br /&gt;
==Conference Project Sponsors== &lt;br /&gt;
The OWASP Conferences project is sponsored by:&lt;br /&gt;
&lt;br /&gt;
[http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif] and &lt;br /&gt;
[http://www.kuleuven.be/english https://www.owasp.org/images/9/97/Kuleuven.jpg]&lt;br /&gt;
&lt;br /&gt;
==Conference Sponsors==&lt;br /&gt;
The 7th OWASP AppSec Conference held in San Jose, CA in Nov 2007 was sponsored by:&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Conference_Sponsors_2007_San_Jose}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- __NOTOC__ --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Sponsor a Conference==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;an OWASP Conference&amp;lt;/paypal&amp;gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42550</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42550"/>
				<updated>2008-10-08T07:01:17Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Korea, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM], Frank Fan&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42549</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42549"/>
				<updated>2008-10-08T06:16:51Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Application Proactive and Passive Defense Best Practices&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Frank Fan, OWASP China]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:00- 10:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:40- 11:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:40- 12:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:30 - 13:30 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:30 - 14:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:30 - 15:20''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 15:20 - 15:40 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:40 - 16:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:40 - 17:30''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], [https://www.owasp.org/index.php/Tim_Bass%2C_OWASP_Thailand Tim Bass], [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM], Frank Fan&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Best_Practices_for_OWASP_Chapter_Leaders&amp;diff=42538</id>
		<title>Best Practices for OWASP Chapter Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Best_Practices_for_OWASP_Chapter_Leaders&amp;diff=42538"/>
				<updated>2008-10-08T02:31:02Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Working Session Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Best Practices for OWASP Chapter Leaders'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The aim of the Workshop is to identify existing material, prepare some ideas and compile a &amp;quot;Chapter Best Practices Guideline&amp;quot; together after the Summit.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[[:Category:OWASP_Chapter|OWASP Chapters]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:georg.hess(at)artofdefence.com '''Georg Heß''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:seba(at)owasp.org '''Sebastien Deleersnyder''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-leaders '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
You´ve already started a local Chapter and know the Chapter rules &amp;quot;by heart&amp;quot;. However, you most certainly have questions about growing, financing and &amp;quot;local&amp;quot; vs. &amp;quot;board&amp;quot; decision-making processes... The aim of the Workshop is to identify existing material, prepare some ideas and compile a &amp;quot;Chapter Best Practices Guideline&amp;quot; together after the Summit. Typical challenges are:&lt;br /&gt;
* Money: Where can I get funds from for growing my chapter - e.g. marketing efforts, organisational costs, etc... e.g. OWASP membership fees of local members/portions of it to be credited to the local chapter&lt;br /&gt;
* &amp;quot;Local&amp;quot; decisions: What can the local chapter decide upon e.g. &amp;quot;local PR messages (non English), (local) projects (perhaps as a start of international projects) - using professional help for setting up conferences etc.&lt;br /&gt;
* covering costs for &amp;quot;reasonable&amp;quot; translation efforts..&lt;br /&gt;
* Creating a local &amp;quot;OWASP Foundation&amp;quot; non-profit organisation vs. working as part of the global &amp;quot;OWASP Foundation&amp;quot;&lt;br /&gt;
* Best practices building &amp;quot;local boards&amp;quot; etc.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5 &amp;amp; 7, 2008&amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Best Practices for OWASP Chapter Leaders.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Tom Brennan&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Wayne Huang&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42536</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42536"/>
				<updated>2008-10-08T02:19:30Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank China, Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''China, Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42529</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42529"/>
				<updated>2008-10-08T01:07:57Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Beijing, Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Beijing, Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42528</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42528"/>
				<updated>2008-10-08T01:07:16Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Beijing, Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42497</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42497"/>
				<updated>2008-10-07T17:12:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please [mailto:wayne.owasp@gmail.com email us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42496</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42496"/>
				<updated>2008-10-07T17:11:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please email [mailto:wayne.owasp@gmail.com us].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42493</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42493"/>
				<updated>2008-10-07T16:49:08Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in participating, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
Two professional translators will be at the conference to conduct simutaneous oral translation between English and Mandarin. Wireless earphones will be provided.&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42492</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42492"/>
				<updated>2008-10-07T16:45:05Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42488</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42488"/>
				<updated>2008-10-07T16:29:26Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* (2008/10/27) - Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Hong Kong, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42487</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42487"/>
				<updated>2008-10-07T16:28:36Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* (2008/10/27) - Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42486</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42486"/>
				<updated>2008-10-07T16:28:02Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* (2008/10/27) - Day 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor Yarochkin(Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42467</id>
		<title>OWASP AppSec Asia 2008 - Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Asia_2008_-_Taiwan&amp;diff=42467"/>
				<updated>2008-10-07T15:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Welcome to OWASP AppSec Asia 2008! We'd like to thank Delhi, Hong Kong, Mumbai, Singapore, Taiwan, Thailand, and Vietnam Chapters for helping out with the conference and for attending the conference. We are working with other chapters across Asia to see if we can invite more chapters. If you represent an Asia chapter and are interested in attending, please email [mailto:wayne.owasp@gmail.com Wayne].&lt;br /&gt;
&lt;br /&gt;
== OWASP AppSec Asia 2008, Conference Schedule (Oct 27th - Oct 28th) ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/27) - Day 1 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  08:30 - 09:30 Door opens for registration&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:30- 09:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Opening welcome and an introduction to this year’s program]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Wayne Huang, Conference Chair]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:40-09:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Institute for Information Industry&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''09:50-10:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Welcome by Information Security Consortium, Information Service Industry Association&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00-11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | ''' [[What's Next? Strategies for Web Application Security]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; | '''&amp;lt;BR&amp;gt;[[YM Chen, Director, McAfee Foundstone]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;''' &lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:10-12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web-based Malware obfuscation: the kung-fu and the detection]]'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''&amp;lt;BR&amp;gt;[[Wayne Huang, OWASP Taiwan Chapter]]&amp;lt;br&amp;gt;&amp;lt;BR&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Why Webmail systems are hard to secure--using real case studies]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Charmi Lin, Taiwan Information &amp;amp; Communication Security Technology Center]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:50 - 14:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Proxy Caches and Web Application Security--using the recent Google Docs 0-day as an example]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Tim Bass, OWASP Thailand Chapter]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:40 - 15:00 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:00 - 15:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[How bad can Web vulnerabilities be—case study on a 50 million personal records breach]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[PK (Taiwan Criminal Investigation Bureau)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:50 - 16:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Tiny coding errors, big losses: real stories of website 0wnage]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Fyodor (Guard-Info)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:50 - 17:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Crossing the Chasm: Anatomy of Client-Side and Browser-Based Attacks]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Dhruv Soi (OWASP Delhi Chapter Leader)]], [[Pukhraj Singh (OWASP Delhi Chapter)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''17:40 - 18:40''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''Asia Chapter Leader’s Meeting &amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''Delhi, Mumbai, Singapore Taiwan, Thailand, and Vietnam Chapter Leaders&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |  &lt;br /&gt;
=== (2008/10/28) - Day 2 ===&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''10:00- 11:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Robert &amp;quot;RSnake&amp;quot; Hansen (SecTheory)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''11:00- 12:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Web 2.0, Consumerization, and Application Security]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Chenxi Wang, Ph.D. (Forrester Research)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 12:00 - 13:00 Lunch&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''13:00 - 13:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Good Business Penetration Testing]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[KK Mookhey (OWASP Mumbai)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''14:00 - 14:50''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Best Practices Guide: Web Application Firewalls]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Alexander Meisel (OWASP Germany)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
|-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | 14:50 - 15:10 Coffee Break&lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4F81BD; color:white&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; | '''TIME''' || style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SESSION'''&lt;br /&gt;
 | style=&amp;quot;width:33%; background:#4F81BD; color:white&amp;quot; align=&amp;quot;center&amp;quot; | '''SPEAKER'''&lt;br /&gt;
 &lt;br /&gt;
  |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''15:10 - 16:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[The HTTP Botnet Research: Focusing on HTTP based DDoS Botnets]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[[Steven Adair (ShadowServer Foundation)]]&amp;lt;br&amp;gt;'''&lt;br /&gt;
 |-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#4F81BD; color:white&amp;quot; | '''16:10 - 17:00''' || style=&amp;quot;width:30%; background:#A7BFDE&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Panel: Manual auditing or automated tools? Blackbox, whitebox, or WAF?]]&amp;lt;BR&amp;gt;&amp;lt;br&amp;gt;'''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#EEF0F7; color:#4A4AFF&amp;quot; align=&amp;quot;center&amp;quot; |  '''[https://www.owasp.org/index.php/Alexander_Meisel_(OWASP_Germany) Alex], [https://www.owasp.org/index.php/Chenxi_Wang%2C_Ph.D._(Forrester_Research) Chenxi], [https://www.owasp.org/index.php/Dhruv_Soi_(OWASP_Delhi_Chapter_Leader) Dhruv], [https://www.owasp.org/index.php/Fyodor_(Guard-Info) Fyodor],  [https://www.owasp.org/index.php/KK_Mookhey_(OWASP_Mumbai) KK], [https://www.owasp.org/index.php/Robert_%22RSnake%22_Hansen_(SecTheory) Robert], Tim Bass, [https://www.owasp.org/index.php/Wayne_Huang%2C_OWASP_Taiwan_Chapter Wayne], [https://www.owasp.org/index.php/YM_Chen%2C_Director%2C_McAfee_Foundstone YM]&amp;lt;br&amp;gt;'''&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
==Conference Fees &amp;amp; Registration==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Conference Fees ===&lt;br /&gt;
&lt;br /&gt;
The fee for the two days conference is USD 35, which includes:&lt;br /&gt;
*Two lunches&lt;br /&gt;
*Coffee breaks&lt;br /&gt;
*Conference T-Shirt&lt;br /&gt;
&lt;br /&gt;
=== Registration ===&lt;br /&gt;
&lt;br /&gt;
Registration is now open!! Please [mailto:wayne.owasp@gmail.com '''contact us'''] for the registration.&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41667</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41667"/>
				<updated>2008-09-30T19:08:37Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 最新活動 ==&lt;br /&gt;
=== [[OWASP_AppSec_Asia_2007|第一屆OWASP官方亞洲年會(OWASP Asia 2007)]] ===&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[OWASP_AppSec_Asia_2007 http://www.owasp.org/images/f/f7/Owasp_taiwan_2007small.png]&lt;br /&gt;
&lt;br /&gt;
Whitehat Security、美國運通(American Express)、阿碼科技(Armorize)、Qualys等跨國企業與資安公司的高階主管與首席研究員齊聚台灣，您知道他們如何看待Web 2.0時代之 Security 3.0嗎？對台灣與全球的含意是什麼？我政府、企業與一般使用者又該如何因應？從下面這些2007年的資安界大新聞，透露著怎樣的訊息？&lt;br /&gt;
* 5月11日起，Google開始監控遭駭網站，並貼上危險網站之標籤!&lt;br /&gt;
* 5月15日月OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首!&lt;br /&gt;
* 6月6日IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics!而僅存的Cenzic以滲透測試技術於6月18日獲得美國專利!&lt;br /&gt;
* Web 2.0的資安威脅？因應之道？Security 3.0？成功的實務案例？&lt;br /&gt;
[[OWASP_AppSec_Asia_2007|第一屆OWASP官方亞洲年會]]將於9月27日(週四)下午1點於台大醫院國際會議中心201室(台北市中正區徐州路二號)'''舉辦，歡迎您來共襄盛舉，滿載而歸![[OWASP_AppSec_Asia_2007|還有更多...]]&lt;br /&gt;
&lt;br /&gt;
=== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ===&lt;br /&gt;
&lt;br /&gt;
[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]已於2007年7月21日(週六)至22日(週日)在國立臺灣科技大學公館校區圓滿落幕，活動盛況空前，詳情請見 HIT 2007 官方網站:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Taiwan|extra=The chapter leader is [mailto:wayne@owasp.org.tw Wayne Huang]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-taiwan|emailarchives=http://lists.owasp.org/pipermail/owasp-taiwan}}&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用'''&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2008年7月22日起，行政院研考會與資通安全會報技服中心舉辦之[http://www.icst.org.tw/content/application/icst2005/a1001001100110151/guest-cnt-browse.php?var=0,1001,111,100100110017,3353,plan&amp;amp;PHPSESSID=d4815b38629332871cf75bb829fd5546 政府機關軟體安全技術研討會]，透過Web 應用程式安全參考指引導入案例，瞭解Web應用程式可能弱點，提供各機關(構)委外管理參考。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年6月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=43813 網站安全潰堤，不安全就沒顧客]」，深入追蹤Google搜尋引擎因應惡意網站之新措施，其搜尋結果會為有資安問題的網站貼上警告標籤，並阻止使用者直接瀏覽。&lt;br /&gt;
&lt;br /&gt;
*OWASP台灣分會參展:在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=42866 OWASP台灣分會成立會員免費招募中，盼助我國Web安全防護跟上國際趨勢]」。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月9日，蘋果日報報導台灣已有ESPN體育台等許多與民眾生活息息相關的二十七個官網，三月以來陸續遭駭客植入木馬後門，藉由軟體廠商尚無修補程式的「零時差攻擊」（Zero-Day Attack），無辜使用者只要連上網瀏覽，電腦就中獎，輕者帳號、密碼遭竊，身分被盜用；重者機敏資料外洩或財物損失。&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。NEW![https://www.owasp.org/images/b/b1/%E5%B7%A1%E8%BF%B4%E7%A0%94%E8%A8%8E%E6%9C%83%E8%AC%9B%E7%BE%A9_Web.pdf 研討會講義下載]&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月21日，中國時報報導「上網最不安全國家，台灣高居第二」，由法務部調查局、刑事局等單位共同針對台灣網路安全進行觀察發現，台灣網路的資訊安全威脅，高居亞洲第二，僅次於中國。2007年初至今，平均每天都會發生5件駭客入侵事件。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月8日，東森新聞報導「台灣駭客攻擊事件四小龍之冠，90％銀行曾遭入侵」，然而許多企業都以沒有預算為由，不願意增加防護設備與人力，被駭客竄改入侵網頁，不瞭解背後嚴重的意義，網頁改回後，並沒有增加防護設備，甚至還有單一企業被駭連續高達82次。[http://www.ettoday.com/2007/03/08/339-2063921.htm 原新聞連結]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===十大Web資安漏洞列表===&lt;br /&gt;
*A1. 跨網站的入侵字串(Cross Site Scripting，簡稱XSS，亦稱為跨站腳本攻擊)：Web應用程式直接將來自使用者的執行請求送回瀏覽器執行，使得攻擊者可擷取使用者的Cookie或Session資料而能假冒直接登入為合法使用者。&lt;br /&gt;
*A2. 注入缺失(Injection Flaw)：Web應用程式執行來自外部包括資料庫在內的惡意指令，SQL Injection與Command Injection等攻擊包括在內。&lt;br /&gt;
*A3. 惡意檔案執行(Malicious File Execution)：Web應用程式引入來自外部的惡意檔案並執行檔案內容。&lt;br /&gt;
*A4. 不安全的物件參考(Insecure Direct Object Reference)：攻擊者利用Web應用程式本身的檔案讀取功能任意存取檔案或重要資料，案例包括http://example/read.php?file=../../../../../../../c:\boot.ini。&lt;br /&gt;
*A5. 跨網站的偽造要求 (Cross-Site Request Forgery，簡稱CSRF): 已登入Web應用程式的合法使用者執行到惡意的HTTP指令，但Web應用程式卻當成合法需求處理，使得惡意指令被正常執行，案例包括社交網站分享的 QuickTime、Flash影片中藏有惡意的HTTP請求。&lt;br /&gt;
*A6. 資訊揭露與不適當錯誤處置 (Information Leakage and Improper Error Handling)：Web應用程式的執行錯誤訊息包含敏感資料，案例包括:系統檔案路徑的揭露或資料庫欄位名稱。&lt;br /&gt;
*A7. 遭破壞的鑑別與連線管理(Broken Authentication and Session Management)：Web應用程式中自行撰寫的身分驗證相關功能有缺陷。&lt;br /&gt;
*A8. 不安全的密碼儲存器 (Insecure Cryptographic Storage)：Web應用程式沒有對敏感性資料使用加密、使用較弱的加密演算法或將金鑰儲存於容易被取得之處。&lt;br /&gt;
*A9. 不安全的通訊(Insecure Communication)：傳送敏感性資料時並未使用HTTPS或其他加密方式。&lt;br /&gt;
*A10. 疏於限制URL存取(Failure to Restrict URL Access)：某些網頁因為沒有權限控制，使得攻擊者可透過網址直接存取，案例包括允許直接修改Wiki或Blog網頁內容。&lt;br /&gt;
&lt;br /&gt;
這次OWASP公布新版Top 10反映出目前的攻擊現況，以今年為例，Cross-Site Scripting(XSS)調整為10大攻擊之首，真實的反映出目前網路釣魚與詐欺的攻擊濫用XSS的情形，事實上，美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點.&lt;br /&gt;
&lt;br /&gt;
===直接與程式碼安全品質有關=== &lt;br /&gt;
*[必要*]A1. 跨網站的入侵字串(Cross Site Scripting)&lt;br /&gt;
*[必要*]A2. 注入缺失(Injection Flaw)&lt;br /&gt;
*[建議*]A3. 惡意檔案執行(Malicious File Execution)&lt;br /&gt;
*[建議*]A4. 不安全的物件參考(Insecure Direct Object Reference)&lt;br /&gt;
*[選擇*]A5. 跨網站的偽造要求 (Cross-Site Request Forgery)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41666</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41666"/>
				<updated>2008-09-30T19:06:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* 第一屆OWASP官方亞洲年會(OWASP Asia 2007) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 最新活動 ==&lt;br /&gt;
=== [[OWASP_AppSec_Asia_2007|第一屆OWASP官方亞洲年會(OWASP Asia 2007)]] ===&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[OWASP_AppSec_Asia_2007 http://www.owasp.org/images/f/f7/Owasp_taiwan_2007small.png]&lt;br /&gt;
&lt;br /&gt;
Whitehat Security、美國運通(American Express)、阿碼科技(Armorize)、Qualys等跨國企業與資安公司的高階主管與首席研究員齊聚台灣，您知道他們如何看待Web 2.0時代之 Security 3.0嗎？對台灣與全球的含意是什麼？我政府、企業與一般使用者又該如何因應？從下面這些2007年的資安界大新聞，透露著怎樣的訊息？&lt;br /&gt;
* 5月11日起，Google開始監控遭駭網站，並貼上危險網站之標籤!&lt;br /&gt;
* 5月15日月OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首!&lt;br /&gt;
* 6月6日IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics!而僅存的Cenzic以滲透測試技術於6月18日獲得美國專利!&lt;br /&gt;
* Web 2.0的資安威脅？因應之道？Security 3.0？成功的實務案例？&lt;br /&gt;
[[OWASP_AppSec_Asia_2007|第一屆OWASP官方亞洲年會]]將於9月27日(週四)下午1點於台大醫院國際會議中心201室(台北市中正區徐州路二號)'''舉辦，歡迎您來共襄盛舉，滿載而歸![[Taiwan_OWASP_2007|還有更多...]]&lt;br /&gt;
&lt;br /&gt;
=== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ===&lt;br /&gt;
&lt;br /&gt;
[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]已於2007年7月21日(週六)至22日(週日)在國立臺灣科技大學公館校區圓滿落幕，活動盛況空前，詳情請見 HIT 2007 官方網站:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Taiwan|extra=The chapter leader is [mailto:wayne@owasp.org.tw Wayne Huang]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-taiwan|emailarchives=http://lists.owasp.org/pipermail/owasp-taiwan}}&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用'''&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2008年7月22日起，行政院研考會與資通安全會報技服中心舉辦之[http://www.icst.org.tw/content/application/icst2005/a1001001100110151/guest-cnt-browse.php?var=0,1001,111,100100110017,3353,plan&amp;amp;PHPSESSID=d4815b38629332871cf75bb829fd5546 政府機關軟體安全技術研討會]，透過Web 應用程式安全參考指引導入案例，瞭解Web應用程式可能弱點，提供各機關(構)委外管理參考。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年6月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=43813 網站安全潰堤，不安全就沒顧客]」，深入追蹤Google搜尋引擎因應惡意網站之新措施，其搜尋結果會為有資安問題的網站貼上警告標籤，並阻止使用者直接瀏覽。&lt;br /&gt;
&lt;br /&gt;
*OWASP台灣分會參展:在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=42866 OWASP台灣分會成立會員免費招募中，盼助我國Web安全防護跟上國際趨勢]」。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月9日，蘋果日報報導台灣已有ESPN體育台等許多與民眾生活息息相關的二十七個官網，三月以來陸續遭駭客植入木馬後門，藉由軟體廠商尚無修補程式的「零時差攻擊」（Zero-Day Attack），無辜使用者只要連上網瀏覽，電腦就中獎，輕者帳號、密碼遭竊，身分被盜用；重者機敏資料外洩或財物損失。&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。NEW![https://www.owasp.org/images/b/b1/%E5%B7%A1%E8%BF%B4%E7%A0%94%E8%A8%8E%E6%9C%83%E8%AC%9B%E7%BE%A9_Web.pdf 研討會講義下載]&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月21日，中國時報報導「上網最不安全國家，台灣高居第二」，由法務部調查局、刑事局等單位共同針對台灣網路安全進行觀察發現，台灣網路的資訊安全威脅，高居亞洲第二，僅次於中國。2007年初至今，平均每天都會發生5件駭客入侵事件。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月8日，東森新聞報導「台灣駭客攻擊事件四小龍之冠，90％銀行曾遭入侵」，然而許多企業都以沒有預算為由，不願意增加防護設備與人力，被駭客竄改入侵網頁，不瞭解背後嚴重的意義，網頁改回後，並沒有增加防護設備，甚至還有單一企業被駭連續高達82次。[http://www.ettoday.com/2007/03/08/339-2063921.htm 原新聞連結]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===十大Web資安漏洞列表===&lt;br /&gt;
*A1. 跨網站的入侵字串(Cross Site Scripting，簡稱XSS，亦稱為跨站腳本攻擊)：Web應用程式直接將來自使用者的執行請求送回瀏覽器執行，使得攻擊者可擷取使用者的Cookie或Session資料而能假冒直接登入為合法使用者。&lt;br /&gt;
*A2. 注入缺失(Injection Flaw)：Web應用程式執行來自外部包括資料庫在內的惡意指令，SQL Injection與Command Injection等攻擊包括在內。&lt;br /&gt;
*A3. 惡意檔案執行(Malicious File Execution)：Web應用程式引入來自外部的惡意檔案並執行檔案內容。&lt;br /&gt;
*A4. 不安全的物件參考(Insecure Direct Object Reference)：攻擊者利用Web應用程式本身的檔案讀取功能任意存取檔案或重要資料，案例包括http://example/read.php?file=../../../../../../../c:\boot.ini。&lt;br /&gt;
*A5. 跨網站的偽造要求 (Cross-Site Request Forgery，簡稱CSRF): 已登入Web應用程式的合法使用者執行到惡意的HTTP指令，但Web應用程式卻當成合法需求處理，使得惡意指令被正常執行，案例包括社交網站分享的 QuickTime、Flash影片中藏有惡意的HTTP請求。&lt;br /&gt;
*A6. 資訊揭露與不適當錯誤處置 (Information Leakage and Improper Error Handling)：Web應用程式的執行錯誤訊息包含敏感資料，案例包括:系統檔案路徑的揭露或資料庫欄位名稱。&lt;br /&gt;
*A7. 遭破壞的鑑別與連線管理(Broken Authentication and Session Management)：Web應用程式中自行撰寫的身分驗證相關功能有缺陷。&lt;br /&gt;
*A8. 不安全的密碼儲存器 (Insecure Cryptographic Storage)：Web應用程式沒有對敏感性資料使用加密、使用較弱的加密演算法或將金鑰儲存於容易被取得之處。&lt;br /&gt;
*A9. 不安全的通訊(Insecure Communication)：傳送敏感性資料時並未使用HTTPS或其他加密方式。&lt;br /&gt;
*A10. 疏於限制URL存取(Failure to Restrict URL Access)：某些網頁因為沒有權限控制，使得攻擊者可透過網址直接存取，案例包括允許直接修改Wiki或Blog網頁內容。&lt;br /&gt;
&lt;br /&gt;
這次OWASP公布新版Top 10反映出目前的攻擊現況，以今年為例，Cross-Site Scripting(XSS)調整為10大攻擊之首，真實的反映出目前網路釣魚與詐欺的攻擊濫用XSS的情形，事實上，美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點.&lt;br /&gt;
&lt;br /&gt;
===直接與程式碼安全品質有關=== &lt;br /&gt;
*[必要*]A1. 跨網站的入侵字串(Cross Site Scripting)&lt;br /&gt;
*[必要*]A2. 注入缺失(Injection Flaw)&lt;br /&gt;
*[建議*]A3. 惡意檔案執行(Malicious File Execution)&lt;br /&gt;
*[建議*]A4. 不安全的物件參考(Insecure Direct Object Reference)&lt;br /&gt;
*[選擇*]A5. 跨網站的偽造要求 (Cross-Site Request Forgery)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41665</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41665"/>
				<updated>2008-09-30T19:04:07Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 最新活動 ==&lt;br /&gt;
=== [[OWASP_AppSec_Asia_2007|第一屆OWASP官方亞洲年會(OWASP Asia 2007)]] ===&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan_OWASP_2007 http://www.owasp.org/images/f/f7/Owasp_taiwan_2007small.png]&lt;br /&gt;
&lt;br /&gt;
Whitehat Security、美國運通(American Express)、阿碼科技(Armorize)、Qualys等跨國企業與資安公司的高階主管與首席研究員齊聚台灣，您知道他們如何看待Web 2.0時代之 Security 3.0嗎？對台灣與全球的含意是什麼？我政府、企業與一般使用者又該如何因應？從下面這些2007年的資安界大新聞，透露著怎樣的訊息？&lt;br /&gt;
* 5月11日起，Google開始監控遭駭網站，並貼上危險網站之標籤!&lt;br /&gt;
* 5月15日月OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首!&lt;br /&gt;
* 6月6日IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics!而僅存的Cenzic以滲透測試技術於6月18日獲得美國專利!&lt;br /&gt;
* Web 2.0的資安威脅？因應之道？Security 3.0？成功的實務案例？&lt;br /&gt;
[[Taiwan_OWASP_2007|第一屆OWASP官方亞洲年會]]將於9月27日(週四)下午1點於台大醫院國際會議中心201室(台北市中正區徐州路二號)'''舉辦，歡迎您來共襄盛舉，滿載而歸![[Taiwan_OWASP_2007|還有更多...]]&lt;br /&gt;
&lt;br /&gt;
=== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ===&lt;br /&gt;
&lt;br /&gt;
[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]已於2007年7月21日(週六)至22日(週日)在國立臺灣科技大學公館校區圓滿落幕，活動盛況空前，詳情請見 HIT 2007 官方網站:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Taiwan|extra=The chapter leader is [mailto:wayne@owasp.org.tw Wayne Huang]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-taiwan|emailarchives=http://lists.owasp.org/pipermail/owasp-taiwan}}&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用'''&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2008年7月22日起，行政院研考會與資通安全會報技服中心舉辦之[http://www.icst.org.tw/content/application/icst2005/a1001001100110151/guest-cnt-browse.php?var=0,1001,111,100100110017,3353,plan&amp;amp;PHPSESSID=d4815b38629332871cf75bb829fd5546 政府機關軟體安全技術研討會]，透過Web 應用程式安全參考指引導入案例，瞭解Web應用程式可能弱點，提供各機關(構)委外管理參考。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年6月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=43813 網站安全潰堤，不安全就沒顧客]」，深入追蹤Google搜尋引擎因應惡意網站之新措施，其搜尋結果會為有資安問題的網站貼上警告標籤，並阻止使用者直接瀏覽。&lt;br /&gt;
&lt;br /&gt;
*OWASP台灣分會參展:在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=42866 OWASP台灣分會成立會員免費招募中，盼助我國Web安全防護跟上國際趨勢]」。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月9日，蘋果日報報導台灣已有ESPN體育台等許多與民眾生活息息相關的二十七個官網，三月以來陸續遭駭客植入木馬後門，藉由軟體廠商尚無修補程式的「零時差攻擊」（Zero-Day Attack），無辜使用者只要連上網瀏覽，電腦就中獎，輕者帳號、密碼遭竊，身分被盜用；重者機敏資料外洩或財物損失。&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。NEW![https://www.owasp.org/images/b/b1/%E5%B7%A1%E8%BF%B4%E7%A0%94%E8%A8%8E%E6%9C%83%E8%AC%9B%E7%BE%A9_Web.pdf 研討會講義下載]&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月21日，中國時報報導「上網最不安全國家，台灣高居第二」，由法務部調查局、刑事局等單位共同針對台灣網路安全進行觀察發現，台灣網路的資訊安全威脅，高居亞洲第二，僅次於中國。2007年初至今，平均每天都會發生5件駭客入侵事件。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月8日，東森新聞報導「台灣駭客攻擊事件四小龍之冠，90％銀行曾遭入侵」，然而許多企業都以沒有預算為由，不願意增加防護設備與人力，被駭客竄改入侵網頁，不瞭解背後嚴重的意義，網頁改回後，並沒有增加防護設備，甚至還有單一企業被駭連續高達82次。[http://www.ettoday.com/2007/03/08/339-2063921.htm 原新聞連結]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===十大Web資安漏洞列表===&lt;br /&gt;
*A1. 跨網站的入侵字串(Cross Site Scripting，簡稱XSS，亦稱為跨站腳本攻擊)：Web應用程式直接將來自使用者的執行請求送回瀏覽器執行，使得攻擊者可擷取使用者的Cookie或Session資料而能假冒直接登入為合法使用者。&lt;br /&gt;
*A2. 注入缺失(Injection Flaw)：Web應用程式執行來自外部包括資料庫在內的惡意指令，SQL Injection與Command Injection等攻擊包括在內。&lt;br /&gt;
*A3. 惡意檔案執行(Malicious File Execution)：Web應用程式引入來自外部的惡意檔案並執行檔案內容。&lt;br /&gt;
*A4. 不安全的物件參考(Insecure Direct Object Reference)：攻擊者利用Web應用程式本身的檔案讀取功能任意存取檔案或重要資料，案例包括http://example/read.php?file=../../../../../../../c:\boot.ini。&lt;br /&gt;
*A5. 跨網站的偽造要求 (Cross-Site Request Forgery，簡稱CSRF): 已登入Web應用程式的合法使用者執行到惡意的HTTP指令，但Web應用程式卻當成合法需求處理，使得惡意指令被正常執行，案例包括社交網站分享的 QuickTime、Flash影片中藏有惡意的HTTP請求。&lt;br /&gt;
*A6. 資訊揭露與不適當錯誤處置 (Information Leakage and Improper Error Handling)：Web應用程式的執行錯誤訊息包含敏感資料，案例包括:系統檔案路徑的揭露或資料庫欄位名稱。&lt;br /&gt;
*A7. 遭破壞的鑑別與連線管理(Broken Authentication and Session Management)：Web應用程式中自行撰寫的身分驗證相關功能有缺陷。&lt;br /&gt;
*A8. 不安全的密碼儲存器 (Insecure Cryptographic Storage)：Web應用程式沒有對敏感性資料使用加密、使用較弱的加密演算法或將金鑰儲存於容易被取得之處。&lt;br /&gt;
*A9. 不安全的通訊(Insecure Communication)：傳送敏感性資料時並未使用HTTPS或其他加密方式。&lt;br /&gt;
*A10. 疏於限制URL存取(Failure to Restrict URL Access)：某些網頁因為沒有權限控制，使得攻擊者可透過網址直接存取，案例包括允許直接修改Wiki或Blog網頁內容。&lt;br /&gt;
&lt;br /&gt;
這次OWASP公布新版Top 10反映出目前的攻擊現況，以今年為例，Cross-Site Scripting(XSS)調整為10大攻擊之首，真實的反映出目前網路釣魚與詐欺的攻擊濫用XSS的情形，事實上，美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點.&lt;br /&gt;
&lt;br /&gt;
===直接與程式碼安全品質有關=== &lt;br /&gt;
*[必要*]A1. 跨網站的入侵字串(Cross Site Scripting)&lt;br /&gt;
*[必要*]A2. 注入缺失(Injection Flaw)&lt;br /&gt;
*[建議*]A3. 惡意檔案執行(Malicious File Execution)&lt;br /&gt;
*[建議*]A4. 不安全的物件參考(Insecure Direct Object Reference)&lt;br /&gt;
*[選擇*]A5. 跨網站的偽造要求 (Cross-Site Request Forgery)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41654</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=41654"/>
				<updated>2008-09-30T18:42:19Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 最新活動 ==&lt;br /&gt;
=== [[Taiwan_OWASP_2007|第一屆OWASP官方亞洲年會(OWASP Asia 2007)]] ===&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Taiwan_OWASP_2007 http://www.owasp.org/images/f/f7/Owasp_taiwan_2007small.png]&lt;br /&gt;
&lt;br /&gt;
Whitehat Security、美國運通(American Express)、阿碼科技(Armorize)、Qualys等跨國企業與資安公司的高階主管與首席研究員齊聚台灣，您知道他們如何看待Web 2.0時代之 Security 3.0嗎？對台灣與全球的含意是什麼？我政府、企業與一般使用者又該如何因應？從下面這些2007年的資安界大新聞，透露著怎樣的訊息？&lt;br /&gt;
* 5月11日起，Google開始監控遭駭網站，並貼上危險網站之標籤!&lt;br /&gt;
* 5月15日月OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首!&lt;br /&gt;
* 6月6日IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics!而僅存的Cenzic以滲透測試技術於6月18日獲得美國專利!&lt;br /&gt;
* Web 2.0的資安威脅？因應之道？Security 3.0？成功的實務案例？&lt;br /&gt;
[[Taiwan_OWASP_2007|第一屆OWASP官方亞洲年會]]將於9月27日(週四)下午1點於台大醫院國際會議中心201室(台北市中正區徐州路二號)'''舉辦，歡迎您來共襄盛舉，滿載而歸![[Taiwan_OWASP_2007|還有更多...]]&lt;br /&gt;
&lt;br /&gt;
=== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ===&lt;br /&gt;
&lt;br /&gt;
[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]已於2007年7月21日(週六)至22日(週日)在國立臺灣科技大學公館校區圓滿落幕，活動盛況空前，詳情請見 HIT 2007 官方網站:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Taiwan|extra=The chapter leader is [mailto:wayne@owasp.org.tw Wayne Huang]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-taiwan|emailarchives=http://lists.owasp.org/pipermail/owasp-taiwan}}&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用'''&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2008年7月22日起，行政院研考會與資通安全會報技服中心舉辦之[http://www.icst.org.tw/content/application/icst2005/a1001001100110151/guest-cnt-browse.php?var=0,1001,111,100100110017,3353,plan&amp;amp;PHPSESSID=d4815b38629332871cf75bb829fd5546 政府機關軟體安全技術研討會]，透過Web 應用程式安全參考指引導入案例，瞭解Web應用程式可能弱點，提供各機關(構)委外管理參考。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年6月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=43813 網站安全潰堤，不安全就沒顧客]」，深入追蹤Google搜尋引擎因應惡意網站之新措施，其搜尋結果會為有資安問題的網站貼上警告標籤，並阻止使用者直接瀏覽。&lt;br /&gt;
&lt;br /&gt;
*OWASP台灣分會參展:在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月11日，iThome報導「[http://www.ithome.com.tw/itadm/article.php?c=42866 OWASP台灣分會成立會員免費招募中，盼助我國Web安全防護跟上國際趨勢]」。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年4月9日，蘋果日報報導台灣已有ESPN體育台等許多與民眾生活息息相關的二十七個官網，三月以來陸續遭駭客植入木馬後門，藉由軟體廠商尚無修補程式的「零時差攻擊」（Zero-Day Attack），無辜使用者只要連上網瀏覽，電腦就中獎，輕者帳號、密碼遭竊，身分被盜用；重者機敏資料外洩或財物損失。&lt;br /&gt;
&lt;br /&gt;
*Web應用程式安全研討會:在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。NEW![https://www.owasp.org/images/b/b1/%E5%B7%A1%E8%BF%B4%E7%A0%94%E8%A8%8E%E6%9C%83%E8%AC%9B%E7%BE%A9_Web.pdf 研討會講義下載]&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月21日，中國時報報導「上網最不安全國家，台灣高居第二」，由法務部調查局、刑事局等單位共同針對台灣網路安全進行觀察發現，台灣網路的資訊安全威脅，高居亞洲第二，僅次於中國。2007年初至今，平均每天都會發生5件駭客入侵事件。&lt;br /&gt;
&lt;br /&gt;
*Web安全新聞:在2007年3月8日，東森新聞報導「台灣駭客攻擊事件四小龍之冠，90％銀行曾遭入侵」，然而許多企業都以沒有預算為由，不願意增加防護設備與人力，被駭客竄改入侵網頁，不瞭解背後嚴重的意義，網頁改回後，並沒有增加防護設備，甚至還有單一企業被駭連續高達82次。[http://www.ettoday.com/2007/03/08/339-2063921.htm 原新聞連結]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===十大Web資安漏洞列表===&lt;br /&gt;
*A1. 跨網站的入侵字串(Cross Site Scripting，簡稱XSS，亦稱為跨站腳本攻擊)：Web應用程式直接將來自使用者的執行請求送回瀏覽器執行，使得攻擊者可擷取使用者的Cookie或Session資料而能假冒直接登入為合法使用者。&lt;br /&gt;
*A2. 注入缺失(Injection Flaw)：Web應用程式執行來自外部包括資料庫在內的惡意指令，SQL Injection與Command Injection等攻擊包括在內。&lt;br /&gt;
*A3. 惡意檔案執行(Malicious File Execution)：Web應用程式引入來自外部的惡意檔案並執行檔案內容。&lt;br /&gt;
*A4. 不安全的物件參考(Insecure Direct Object Reference)：攻擊者利用Web應用程式本身的檔案讀取功能任意存取檔案或重要資料，案例包括http://example/read.php?file=../../../../../../../c:\boot.ini。&lt;br /&gt;
*A5. 跨網站的偽造要求 (Cross-Site Request Forgery，簡稱CSRF): 已登入Web應用程式的合法使用者執行到惡意的HTTP指令，但Web應用程式卻當成合法需求處理，使得惡意指令被正常執行，案例包括社交網站分享的 QuickTime、Flash影片中藏有惡意的HTTP請求。&lt;br /&gt;
*A6. 資訊揭露與不適當錯誤處置 (Information Leakage and Improper Error Handling)：Web應用程式的執行錯誤訊息包含敏感資料，案例包括:系統檔案路徑的揭露或資料庫欄位名稱。&lt;br /&gt;
*A7. 遭破壞的鑑別與連線管理(Broken Authentication and Session Management)：Web應用程式中自行撰寫的身分驗證相關功能有缺陷。&lt;br /&gt;
*A8. 不安全的密碼儲存器 (Insecure Cryptographic Storage)：Web應用程式沒有對敏感性資料使用加密、使用較弱的加密演算法或將金鑰儲存於容易被取得之處。&lt;br /&gt;
*A9. 不安全的通訊(Insecure Communication)：傳送敏感性資料時並未使用HTTPS或其他加密方式。&lt;br /&gt;
*A10. 疏於限制URL存取(Failure to Restrict URL Access)：某些網頁因為沒有權限控制，使得攻擊者可透過網址直接存取，案例包括允許直接修改Wiki或Blog網頁內容。&lt;br /&gt;
&lt;br /&gt;
這次OWASP公布新版Top 10反映出目前的攻擊現況，以今年為例，Cross-Site Scripting(XSS)調整為10大攻擊之首，真實的反映出目前網路釣魚與詐欺的攻擊濫用XSS的情形，事實上，美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點.&lt;br /&gt;
&lt;br /&gt;
===直接與程式碼安全品質有關=== &lt;br /&gt;
*[必要*]A1. 跨網站的入侵字串(Cross Site Scripting)&lt;br /&gt;
*[必要*]A2. 注入缺失(Injection Flaw)&lt;br /&gt;
*[建議*]A3. 惡意檔案執行(Malicious File Execution)&lt;br /&gt;
*[建議*]A4. 不安全的物件參考(Insecure Direct Object Reference)&lt;br /&gt;
*[選擇*]A5. 跨網站的偽造要求 (Cross-Site Request Forgery)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19490</id>
		<title>OWASP Asia 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19490"/>
				<updated>2007-06-30T00:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Yen-Ming Chen (McAfee資安諮詢部門主任、前Foundstone首席資安顧問) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 第一屆OWASP台灣分會高峰會議 (OWASP-TW 2007) （完全免費）==&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
OWASP將於台灣召開第一屆的台灣分會高峰會議，將邀請國內外重量級專家齊聚一堂與會員分享與交流最新資安趨勢與實務案例。&lt;br /&gt;
&lt;br /&gt;
「Web 2.0時代之Security 3.0 — 從實務經驗看Web資安防護之挑戰&lt;br /&gt;
&lt;br /&gt;
* 2007年5月11日，Google開始監控遭駭網站，並貼上危險網站之標籤，政府及企業該如何應對？&lt;br /&gt;
* 2007年5月15日，OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首，對台灣及全球的含意為何？&lt;br /&gt;
* 2007年6月6日，IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics？為何在短短一個月內，重量級資訊巨人跨足資安產業？而僅存的Cenzic以滲透測試技術於6月18日甫獲美國專利，又將對產業有何影響？&lt;br /&gt;
* Web 2.0面臨哪些新的資安威脅？其因應之道是什麼？ 什麼是Security 3.0？又有哪些成功的實務案例？&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
第一屆OWASP台灣分會高峰會議暨會員大會將於2007年7月20日（週五）下午1點至5點舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，將由國內外知名專家一同與您探討，目前規劃演講者包含任職於國內外產、官、學的資安專家，詳細內容如下。&lt;br /&gt;
&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地限制，席次僅提供前200名來信報名者，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。報名方式請見頁尾。'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===OWASP台灣分會會長致詞===&lt;br /&gt;
====黃耀文(Wayne Huang) ([http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web 阿碼科技]創辦人兼執行長)====&lt;br /&gt;
[[Image:owasp_taiwan_wayne.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''簡介''': Wayne Huang is first author of two award-winning security papers in the International WWW Conference (2003, 2004) and the co-author of &amp;quot;Computer Security in the 21st Century&amp;quot;. Wayne is the founder and CEO of [http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web Armorize Technologies]. He received the Microsoft Research Fellowship in 2005. He is a Ph.D. candidate at EE, National Taiwan University. He was the first author of many well-cited papers on web application security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===第一場時段講者(1:00pm-3:30pm)===&lt;br /&gt;
====Yen-Ming Chen (McAfee資安諮詢部門主任、Foundstone首席資安顧問)====&lt;br /&gt;
[[Image:owasp_taiwan_yenming.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Trends in Web Application Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, CERT, and ICST&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':四本暢銷資安書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_yenming1.jpg|100px]][[Image:owasp_taiwan_yenming2.jpg|100px]][[Image:owasp_taiwan_yenming3.jpg|100px]][[Image:owasp_taiwan_yenming4.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Yen-Ming leads Foundstone consultants to provide strategic security consulting services to the clients. His duties include managing all consulting and training activities, ranging from sales support to project execution. Yen-Ming joined Foundstone as a consultant in 2000. Yen-Ming brings extensive knowledge in both business and technology to his clients. He focuses primarily on generic security assessment. In client engagements, Yen-Ming helps clients align their security strategies with their business goals. He served as a Lead Instructor for Foundstone’s Ultimate Hacking, Ultimate Hacking Expert, Ultimate Web Hacking and Ultimate Hacking: Incident Response classes. Yen-Ming is a published author and sought-after speaker in both North America and the Pacific Rim. His articles have been published by SecurityFocus, SysAdmin, UnixReview, DevX, PCWeek, CNET Taiwan, ITHome, and other technology magazines in both North America and Asia Pacific. Yen-Ming has been interviewed by BBC and other media across the globe, and he has been a featured presenter at conferences, including PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, APAC Regional Conference on Electronic Safety and Soundness for Financial Services, Hong Kong CERT, and ICST conferences. Yen-Ming has contributed to several books, including: Hacking Exposed, 3rd ed., Hacking Exposed for Web Applications, Windows XP Professional Security, and HackNotes: Web Application Security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Mike Shema (Qualys首席資安研究員)====&lt;br /&gt;
[[Image:owasp_taiwan_mike.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Managing Web Application Security with Automated Tools'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':BlackHat 2004, RSA 2005, IT Underground 2006, and SACIS 2007. Training at BlackHat conferences in the U.S. and Europe&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':九本資安暢銷書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_mike1.jpg|100px]][[Image:owasp_taiwan_mike2.jpg|100px]][[Image:owasp_taiwan_mike3.jpg|100px]][[Image:owasp_taiwan_mike4.jpg|100px]][[Image:owasp_taiwan_mike5.jpg|100px]][[Image:owasp_taiwan_mike6.jpg|100px]][[Image:owasp_taiwan_mike7.png|100px]][[Image:owasp_taiwan_mike8.jpg|100px]][[Image:owasp_taiwan_mike9.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Shema is the co-author of Hacking Exposed: Web Applications, The Anti-Hacker Toolkit, and the author of Hack Notes: Web Application Security. Mr. Shema worked for several years as a consultant and trainer at Foundstone where he conducted information security assessments across a variety of technologies and industries. He also worked at NT Objectives to develop assessment and mitigation strategies for all aspects of web application security. While his security background ranges across network penetration testing, wireless auditing, code review, and training, Mr. Shema primarily focuses on web application security. Mr. Shema is currently employed by Qualys, developing tools that automate the web application audit process.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 何全德處長 (行政院研考會資訊處) ====&lt;br /&gt;
[[Image:owasp_taiwan_ho.gif|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security in Taiwan'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====吳怡芳主任 (中華電信資安專案辦公室)====&lt;br /&gt;
'''題目''': '''''From Internet Service Provider to Internet Security Provider'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===第二場時段講者(3:30pm-5:00pm)===&lt;br /&gt;
====Wayne Huang (OWASP台灣分會會長、[http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web 阿碼科技]創辦人兼執行長)====&lt;br /&gt;
[[Image:owasp_taiwan_wayne.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security 3.0 in Web 2.0 Age—Practices and Challenges of Web 2.0 Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':RSA 2007, HITCon 2007, Zend PHP 2006, HITCon 2006, WWW 2004 and WWW 2003&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_wayne1.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''簡介''': Wayne Huang is first author of two award-winning security papers in the International WWW Conference (2003, 2004) and the co-author of &amp;quot;Computer Security in the 21st Century&amp;quot;. Wayne is the founder and CEO of [http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web Armorize Technologies]. He received the Microsoft Research Fellowship in 2005. He is a Ph.D. candidate at EE, National Taiwan University. He was the first author of many well-cited papers on web application security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
====Ricardo Jenez (Google軟體工程部門主任)====&lt;br /&gt;
'''題目''': '''''Google's Approach to Secure Software Development Lifecycle'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Jenez brings over 14 years of industry experience to eTime Capital , leveraging the latest technology to create highly effective business solutions for industry leaders. He also focuses on developing eTime Capital's strategic technology partnerships. Mr. Jenez was most recently at Netscape Communications as the Senior Development Manager responsible for the creation of a variety of e-commerce applications. Mr. Jenez was part of the core team that defined and implemented the architecture on which Netscape's B-to-B e-commerce applications - SellerXpert and BuyerXpert - were built. Prior to Netscape , Mr. Jenez held positions at General Magic , Tenfold , and Oracle Corporation. He also was the cofounder of Portacom Technologies , which manufactured some of the first Windows Accelerator graphics cards. His Eclipse II product was the recipient of the PC Magazine's Editor's Choice Award and ranked Number 74 on PC Computing's Top 200 PC Products of 1992&amp;quot;. Prior to working at Oracle , Mr. Jenez was on the technical research staff of the MIT Laboratory for Computer Science , working on both hardware and software systems for multiprocessor computers. Mr. Jenez has two Bachelor of Science degrees from MIT , one in Computer Science and the other in Electrical Engineering.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====李德財院士 (TWISC總召集人、中研院資訊所所長、IEEE Fellow、ACM Fellow)====&lt;br /&gt;
[[Image:owasp_taiwan_dtlee.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Taiwan Information Security'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Dr. Lee received his B.S. degree in Electrical Engineering from the National Taiwan University in 1971, and the M.S. and  Ph. D. degrees in Computer Science from the University of Illinois at Urbana-Champaign in 1976 and 1978 respectively. Dr. Lee has been with the Institute of Information Science, Academia Sinica, Taiwan, where he is Director and a Distinguished Research Fellow since July 1, 1998. Prior to joining the Institute, he was a Professor of the Department of Electrical Engineering and Computer Science, Northwestern University, where he has worked since 1978.  Dr. Lee also serves as Director of the Taiwan Information Security Center (TWISC), Acting Director of the Center for Information Technology Innovation, Academia Sinica, and also the Chief Executive Officer of the National Digital Archives Program, both sponsored by the National Science Council, Taiwan.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Jim Roskind (AOL副總裁暨技術長、前Netscape/Netcenter資安架構師、Java安全架構師)====&lt;br /&gt;
'''題目''': '''''How We Secured AOL's Web Infrastructure'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 曾任Netscape副總裁暨首席科學家、創辦Infoseek...During 8 years at Netscape/AOL/TW, Dr. Jim Roskind had titles including VP/CTO of System Infrastructure for America Online, VP/Chief Scientist Netscape, Netscape/Netcenter Security Architect, and Netscape's Java Security Architect. Jim's time as the Java Security Architect in Netscape's Client Product Division, placed him in the near the epicenter of almost all security related problems that appeared in the browser. In addition to tasks involved with technically reconciling issues, he was also a common liaison with contributors that reported security issues (both real and imagined). His notable technical accomplishments at Netscape included the architecture and deployment of signed Java. Before joining Netscape in 1995, Jim was a co-founder of Infoseek Corporation, and later Chief Scientist. Dr. Roskind holds an SB Electrical Engineering, SB Computer Science, SM EECS (1980), and PhD EECS (1983), all from Massachusetts Institute of Technology. His current research and development focus is on his daughter Brianna and son Dylan, all studied in collaboration with his wife Melinda.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次(200名)。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地大小限制，席次僅提供來信報名者，同時請報名者於活動當天提早前往入席，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。'''&lt;br /&gt;
&lt;br /&gt;
===來信報名===&lt;br /&gt;
請email至[mailto:info@owasp.org.tw?subject=OWASP_Taiwan_Registration info@owasp.org.tw]，並註明下列資訊。&lt;br /&gt;
#中文姓名:&lt;br /&gt;
#英文姓名:&lt;br /&gt;
#單位:&lt;br /&gt;
#職稱:&lt;br /&gt;
#電子郵件:&lt;br /&gt;
#聯絡電話:&lt;br /&gt;
#免費加入OWASP台灣分會:(空白為願意加入，若不欲加入請填否)&lt;br /&gt;
&lt;br /&gt;
'''鑑於報名人數踴躍，提醒各位務必準時報到以提早入席，目前大會仍並不強制安排座位，從12:30pm開始接受報到。'''&lt;br /&gt;
&lt;br /&gt;
'''各位報名後，我們將統一於6/29(第一階段)與7/6(第二階段)發送email告知報名成功與報到序號。'''&lt;br /&gt;
&lt;br /&gt;
===會場位置===&lt;br /&gt;
台灣科技大學國際會議廳，交通資訊請參考:[http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16 http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16]。&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue0.gif]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue2.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue1.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ==&lt;br /&gt;
&lt;br /&gt;
今年七月，除了第一屆OWASP台灣分會高峰會議外，[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]將緊接在OWASP高峰會議後的週末，&lt;br /&gt;
也就是2007年7月21日(週六)至22日(週日)舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，歡迎各界人士踴躍報名參加。&lt;br /&gt;
&lt;br /&gt;
詳情可上 HIT 2007 網站查詢:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*[http://www.owasp.org.tw/?utm_source=HIT&amp;amp;utm_medium=web OWASP台灣分會網頁(http://www.owasp.org.tw)]&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19469</id>
		<title>OWASP Asia 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19469"/>
				<updated>2007-06-27T04:54:33Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* Ben Livshits (MSR微軟研究中心研究員、史丹佛大學博士候選人) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 第一屆OWASP台灣分會高峰會議 (OWASP-TW 2007) （完全免費）==&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
OWASP將於台灣召開第一屆的台灣分會高峰會議，將邀請國內外重量級專家齊聚一堂與會員分享與交流最新資安趨勢與實務案例。&lt;br /&gt;
&lt;br /&gt;
「Web 2.0時代之Security 3.0 — 從實務經驗看Web資安防護之挑戰&lt;br /&gt;
&lt;br /&gt;
* 2007年5月11日，Google開始監控遭駭網站，並貼上危險網站之標籤，政府及企業該如何應對？&lt;br /&gt;
* 2007年5月15日，OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首，對台灣及全球的含意為何？&lt;br /&gt;
* 2007年6月6日，IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics？為何在短短一個月內，重量級資訊巨人跨足資安產業？而僅存的Cenzic以滲透測試技術於6月18日甫獲美國專利，又將對產業有何影響？&lt;br /&gt;
* Web 2.0面臨哪些新的資安威脅？其因應之道是什麼？ 什麼是Security 3.0？又有哪些成功的實務案例？&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
第一屆OWASP台灣分會高峰會議暨會員大會將於2007年7月20日（週五）下午1點至5點舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，將由國內外知名專家一同與您探討，目前規劃演講者包含任職於國內外產、官、學的資安專家，詳細內容如下。&lt;br /&gt;
&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地限制，席次僅提供前200名來信報名者，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。報名方式請見頁尾。'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===第一場時段講者(1:00pm-3:30pm)===&lt;br /&gt;
====Yen-Ming Chen (McAfee資安諮詢部門主任、前Foundstone首席資安顧問)====&lt;br /&gt;
[[Image:owasp_taiwan_yenming.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Trends in Web Application Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, CERT, and ICST&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':四本暢銷資安書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_yenming1.jpg|100px]][[Image:owasp_taiwan_yenming2.jpg|100px]][[Image:owasp_taiwan_yenming3.jpg|100px]][[Image:owasp_taiwan_yenming4.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Yen-Ming leads Foundstone consultants to provide strategic security consulting services to the clients. His duties include managing all consulting and training activities, ranging from sales support to project execution. Yen-Ming joined Foundstone as a consultant in 2000. Yen-Ming brings extensive knowledge in both business and technology to his clients. He focuses primarily on generic security assessment. In client engagements, Yen-Ming helps clients align their security strategies with their business goals. He served as a Lead Instructor for Foundstone’s Ultimate Hacking, Ultimate Hacking Expert, Ultimate Web Hacking and Ultimate Hacking: Incident Response classes. Yen-Ming is a published author and sought-after speaker in both North America and the Pacific Rim. His articles have been published by SecurityFocus, SysAdmin, UnixReview, DevX, PCWeek, CNET Taiwan, ITHome, and other technology magazines in both North America and Asia Pacific. Yen-Ming has been interviewed by BBC and other media across the globe, and he has been a featured presenter at conferences, including PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, APAC Regional Conference on Electronic Safety and Soundness for Financial Services, Hong Kong CERT, and ICST conferences. Yen-Ming has contributed to several books, including: Hacking Exposed, 3rd ed., Hacking Exposed for Web Applications, Windows XP Professional Security, and HackNotes: Web Application Security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Mike Shema (Qualys首席資安研究員)====&lt;br /&gt;
[[Image:owasp_taiwan_mike.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Managing Web Application Security with Automated Tools'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':BlackHat 2004, RSA 2005, IT Underground 2006, and SACIS 2007. Training at BlackHat conferences in the U.S. and Europe&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':九本資安暢銷書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_mike1.jpg|100px]][[Image:owasp_taiwan_mike2.jpg|100px]][[Image:owasp_taiwan_mike3.jpg|100px]][[Image:owasp_taiwan_mike4.jpg|100px]][[Image:owasp_taiwan_mike5.jpg|100px]][[Image:owasp_taiwan_mike6.jpg|100px]][[Image:owasp_taiwan_mike7.png|100px]][[Image:owasp_taiwan_mike8.jpg|100px]][[Image:owasp_taiwan_mike9.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Shema is the co-author of Hacking Exposed: Web Applications, The Anti-Hacker Toolkit, and the author of Hack Notes: Web Application Security. Mr. Shema worked for several years as a consultant and trainer at Foundstone where he conducted information security assessments across a variety of technologies and industries. He also worked at NT Objectives to develop assessment and mitigation strategies for all aspects of web application security. While his security background ranges across network penetration testing, wireless auditing, code review, and training, Mr. Shema primarily focuses on web application security. Mr. Shema is currently employed by Qualys, developing tools that automate the web application audit process.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 何全德處長 (行政院研考會資訊處) ====&lt;br /&gt;
[[Image:owasp_taiwan_ho.gif|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security in Taiwan'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====吳怡芳主任 (中華電信資安專案辦公室)====&lt;br /&gt;
'''題目''': '''''From Internet Service Provider to Internet Security Provider'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===第二場時段講者(3:30pm-5:00pm)===&lt;br /&gt;
====Wayne Huang (OWASP台灣分會會長、[http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web 阿碼科技]創辦人兼執行長)====&lt;br /&gt;
[[Image:owasp_taiwan_wayne.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security 3.0 in Web 2.0 Age—Practices and Challenges of Web 2.0 Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':RSA 2007, HITCon 2007, Zend PHP 2006, HITCon 2006, WWW 2004 and WWW 2003&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_wayne1.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''簡介''': Wayne Huang is first author of two award-winning security papers in the International WWW Conference (2003, 2004) and the co-author of &amp;quot;Computer Security in the 21st Century&amp;quot;. Wayne is the founder and CEO of [http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web Armorize Technologies]. He received the Microsoft Research Fellowship in 2005. He is a Ph.D. candidate at EE, National Taiwan University. He was the first author of many well-cited papers on web application security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
====Ricardo Jenez (Google軟體工程部門主任)====&lt;br /&gt;
'''題目''': '''''Google's Approach to Secure Software Development Lifecycle'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Jenez brings over 14 years of industry experience to eTime Capital , leveraging the latest technology to create highly effective business solutions for industry leaders. He also focuses on developing eTime Capital's strategic technology partnerships. Mr. Jenez was most recently at Netscape Communications as the Senior Development Manager responsible for the creation of a variety of e-commerce applications. Mr. Jenez was part of the core team that defined and implemented the architecture on which Netscape's B-to-B e-commerce applications - SellerXpert and BuyerXpert - were built. Prior to Netscape , Mr. Jenez held positions at General Magic , Tenfold , and Oracle Corporation. He also was the cofounder of Portacom Technologies , which manufactured some of the first Windows Accelerator graphics cards. His Eclipse II product was the recipient of the PC Magazine's Editor's Choice Award and ranked Number 74 on PC Computing's Top 200 PC Products of 1992&amp;quot;. Prior to working at Oracle , Mr. Jenez was on the technical research staff of the MIT Laboratory for Computer Science , working on both hardware and software systems for multiprocessor computers. Mr. Jenez has two Bachelor of Science degrees from MIT , one in Computer Science and the other in Electrical Engineering.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====李德財院士 (TWISC總召集人、中研院資訊所所長、IEEE Fellow、ACM Fellow)====&lt;br /&gt;
[[Image:owasp_taiwan_dtlee.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Taiwan Information Security'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Dr. Lee received his B.S. degree in Electrical Engineering from the National Taiwan University in 1971, and the M.S. and  Ph. D. degrees in Computer Science from the University of Illinois at Urbana-Champaign in 1976 and 1978 respectively. Dr. Lee has been with the Institute of Information Science, Academia Sinica, Taiwan, where he is Director and a Distinguished Research Fellow since July 1, 1998. Prior to joining the Institute, he was a Professor of the Department of Electrical Engineering and Computer Science, Northwestern University, where he has worked since 1978.  Dr. Lee also serves as Director of the Taiwan Information Security Center (TWISC), Acting Director of the Center for Information Technology Innovation, Academia Sinica, and also the Chief Executive Officer of the National Digital Archives Program, both sponsored by the National Science Council, Taiwan.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Jim Roskind (AOL副總裁暨技術長、前Netscape副總裁暨首席科學家、創辦Infoseek)====&lt;br /&gt;
'''題目''': '''''How We Secured AOL's Web Infrastructure'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': During 8 years at Netscape/AOL/TW, Dr. Jim Roskind had titles including VP/CTO of System Infrastructure for America Online, VP/Chief Scientist Netscape, Netscape/Netcenter Security Architect, and Netscape's Java Security Architect. Jim's time as the Java Security Architect in Netscape's Client Product Division, placed him in the near the epicenter of almost all security related problems that appeared in the browser. In addition to tasks involved with technically reconciling issues, he was also a common liaison with contributors that reported security issues (both real and imagined). His notable technical accomplishments at Netscape included the architecture and deployment of signed Java. Before joining Netscape in 1995, Jim was a co-founder of Infoseek Corporation, and later Chief Scientist. Dr. Roskind holds an SB Electrical Engineering, SB Computer Science, SM EECS (1980), and PhD EECS (1983), all from Massachusetts Institute of Technology. His current research and development focus is on his daughter Brianna and son Dylan, all studied in collaboration with his wife Melinda.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地限制，席次僅提供前200名來信報名者，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。'''&lt;br /&gt;
&lt;br /&gt;
===來信報名===&lt;br /&gt;
請email至[mailto:info@owasp.org.tw?subject=OWASP_Taiwan_Registration info@owasp.org.tw]，並註明下列資訊。&lt;br /&gt;
#中文姓名:&lt;br /&gt;
#英文姓名:&lt;br /&gt;
#單位:&lt;br /&gt;
#職稱:&lt;br /&gt;
#電子郵件:&lt;br /&gt;
#聯絡電話:&lt;br /&gt;
#免費加入OWASP台灣分會:(空白為願意加入，若不欲加入請填否)&lt;br /&gt;
&lt;br /&gt;
===會場位置===&lt;br /&gt;
台灣科技大學國際會議廳，交通資訊請參考:[http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16 http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16]。&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue0.gif]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue2.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue1.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ==&lt;br /&gt;
&lt;br /&gt;
今年七月，除了第一屆OWASP台灣分會高峰會議外，[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]將緊接在OWASP高峰會議後的週末，&lt;br /&gt;
也就是2007年7月21日(週六)至22日(週日)舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，歡迎各界人士踴躍報名參加。&lt;br /&gt;
&lt;br /&gt;
詳情可上 HIT 2007 網站查詢:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*[http://www.owasp.org.tw/?utm_source=HIT&amp;amp;utm_medium=web OWASP台灣分會網頁(http://www.owasp.org.tw)]&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19436</id>
		<title>OWASP Asia 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Asia_2007&amp;diff=19436"/>
				<updated>2007-06-26T15:58:35Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* 第一屆OWASP台灣分會高峰會議 (OWASP-TW 2007) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== 第一屆OWASP台灣分會高峰會議 (OWASP-TW 2007) （完全免費）==&lt;br /&gt;
'''Security 3.0 in Web 2.0 Age — Practices and Challenges of Web 2.0 Security'''&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007.png|800px]]&lt;br /&gt;
&lt;br /&gt;
OWASP將於台灣召開第一屆的台灣分會高峰會議，將邀請國內外重量級專家齊聚一堂與會員分享與交流最新資安趨勢與實務案例。&lt;br /&gt;
&lt;br /&gt;
「Web 2.0時代之Security 3.0 — 從實務經驗看Web資安防護之挑戰&lt;br /&gt;
&lt;br /&gt;
* 2007年5月11日，Google開始監控遭駭網站，並貼上危險網站之標籤，政府及企業該如何應對？&lt;br /&gt;
* 2007年5月15日，OWASP公佈2007年最新的十大Web弱點，跨站腳本攻擊(XSS)登上榜首，對台灣及全球的含意為何？&lt;br /&gt;
* 2007年6月6日，IBM購併Watchfire，HP隨即於6月19日購併SPI Dynamics？為何在短短一個月內，重量級資訊巨人跨足資安產業？而僅存的Cenzic以滲透測試技術於6月18日甫獲美國專利，又將對產業有何影響？&lt;br /&gt;
* Web 2.0面臨哪些新的資安威脅？其因應之道是什麼？ 什麼是Security 3.0？又有哪些成功的實務案例？&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
第一屆OWASP台灣分會高峰會議暨會員大會將於2007年7月20日（週五）下午1點至5點舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，將由國內外知名專家一同與您探討，目前規劃演講者包含任職於國內外產、官、學的資安專家，詳細內容如下。&lt;br /&gt;
&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地限制，席次僅提供前200名來信報名者，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。報名方式請見頁尾。'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===第一場時段講者(1:00pm-3:30pm)===&lt;br /&gt;
====Yen-Ming Chen (McAfee資安諮詢部門主任、前Foundstone首席資安顧問)====&lt;br /&gt;
[[Image:owasp_taiwan_yenming.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Trends in Web Application Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, CERT, and ICST&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':四本暢銷資安書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_yenming1.jpg|100px]][[Image:owasp_taiwan_yenming2.jpg|100px]][[Image:owasp_taiwan_yenming3.jpg|100px]][[Image:owasp_taiwan_yenming4.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Yen-Ming leads Foundstone consultants to provide strategic security consulting services to the clients. His duties include managing all consulting and training activities, ranging from sales support to project execution. Yen-Ming joined Foundstone as a consultant in 2000. Yen-Ming brings extensive knowledge in both business and technology to his clients. He focuses primarily on generic security assessment. In client engagements, Yen-Ming helps clients align their security strategies with their business goals. He served as a Lead Instructor for Foundstone’s Ultimate Hacking, Ultimate Hacking Expert, Ultimate Web Hacking and Ultimate Hacking: Incident Response classes. Yen-Ming is a published author and sought-after speaker in both North America and the Pacific Rim. His articles have been published by SecurityFocus, SysAdmin, UnixReview, DevX, PCWeek, CNET Taiwan, ITHome, and other technology magazines in both North America and Asia Pacific. Yen-Ming has been interviewed by BBC and other media across the globe, and he has been a featured presenter at conferences, including PACSEC.JP, HITB, HACK.LU, HIT, CSI, MISTI, APAC Regional Conference on Electronic Safety and Soundness for Financial Services, Hong Kong CERT, and ICST conferences. Yen-Ming has contributed to several books, including: Hacking Exposed, 3rd ed., Hacking Exposed for Web Applications, Windows XP Professional Security, and HackNotes: Web Application Security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Mike Shema (Qualys首席資安研究員)====&lt;br /&gt;
[[Image:owasp_taiwan_mike.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Managing Web Application Security with Automated Tools'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':BlackHat 2004, RSA 2005, IT Underground 2006, and SACIS 2007. Training at BlackHat conferences in the U.S. and Europe&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':九本資安暢銷書籍之作者包括&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_mike1.jpg|100px]][[Image:owasp_taiwan_mike2.jpg|100px]][[Image:owasp_taiwan_mike3.jpg|100px]][[Image:owasp_taiwan_mike4.jpg|100px]][[Image:owasp_taiwan_mike5.jpg|100px]][[Image:owasp_taiwan_mike6.jpg|100px]][[Image:owasp_taiwan_mike7.png|100px]][[Image:owasp_taiwan_mike8.jpg|100px]][[Image:owasp_taiwan_mike9.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Shema is the co-author of Hacking Exposed: Web Applications, The Anti-Hacker Toolkit, and the author of Hack Notes: Web Application Security. Mr. Shema worked for several years as a consultant and trainer at Foundstone where he conducted information security assessments across a variety of technologies and industries. He also worked at NT Objectives to develop assessment and mitigation strategies for all aspects of web application security. While his security background ranges across network penetration testing, wireless auditing, code review, and training, Mr. Shema primarily focuses on web application security. Mr. Shema is currently employed by Qualys, developing tools that automate the web application audit process.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== 何全德處長 (行政院研考會資訊處) ====&lt;br /&gt;
[[Image:owasp_taiwan_ho.gif|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security in Taiwan'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====吳怡芳主任 (中華電信資安專案辦公室)====&lt;br /&gt;
'''題目''': '''''From Internet Service Provider to Internet Security Provider'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': 更新中...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===第二場時段講者(3:30pm-5:00pm)===&lt;br /&gt;
====Wayne Huang (OWASP台灣分會會長、[http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web 阿碼科技]創辦人兼執行長)====&lt;br /&gt;
[[Image:owasp_taiwan_wayne.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''Security 3.0 in Web 2.0 Age—Practices and Challenges of Web 2.0 Security'''''&lt;br /&gt;
&lt;br /&gt;
'''國際演說''':RSA 2007, HITCon 2007, Zend PHP 2006, HITCon 2006, WWW 2004 and WWW 2003&lt;br /&gt;
&lt;br /&gt;
'''暢銷書籍''':&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_wayne1.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''簡介''': Wayne Huang is first author of two award-winning security papers in the International WWW Conference (2003, 2004) and the co-author of &amp;quot;Computer Security in the 21st Century&amp;quot;. Wayne is the founder and CEO of [http://www.armorize.com/?utm_source=HIT&amp;amp;utm_medium=web Armorize Technologies]. He received the Microsoft Research Fellowship in 2005. He is a Ph.D. candidate at EE, National Taiwan University. He was the first author of many well-cited papers on web application security.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
====Ricardo Jenez (Google軟體工程部門主任)====&lt;br /&gt;
'''題目''': '''''Engineering Simplicity'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Mr. Jenez brings over 14 years of industry experience to eTime Capital , leveraging the latest technology to create highly effective business solutions for industry leaders. He also focuses on developing eTime Capital's strategic technology partnerships. Mr. Jenez was most recently at Netscape Communications as the Senior Development Manager responsible for the creation of a variety of e-commerce applications. Mr. Jenez was part of the core team that defined and implemented the architecture on which Netscape's B-to-B e-commerce applications - SellerXpert and BuyerXpert - were built. Prior to Netscape , Mr. Jenez held positions at General Magic , Tenfold , and Oracle Corporation. He also was the cofounder of Portacom Technologies , which manufactured some of the first Windows Accelerator graphics cards. His Eclipse II product was the recipient of the PC Magazine's Editor's Choice Award and ranked Number 74 on PC Computing's Top 200 PC Products of 1992&amp;quot;. Prior to working at Oracle , Mr. Jenez was on the technical research staff of the MIT Laboratory for Computer Science , working on both hardware and software systems for multiprocessor computers. Mr. Jenez has two Bachelor of Science degrees from MIT , one in Computer Science and the other in Electrical Engineering.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
====Ben Livshits (MSR微軟研究中心研究員、史丹佛大學博士候選人)====&lt;br /&gt;
[[Image:owasp_taiwan_ben.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
'''題目''': '''''SDL (Secure Development Lifecycle) in Microsoft'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': Benjamin Livshits is currently a Ph.D. candidate in computer science at Stanford University. Benjamin graduated summa cum laude with a B.A. degree in computer science and math from Cornell University in 1999. He obtained an M.S. from Stanford University in 2002. Benjamin's general research area is compilers and program analysis. His research interests include application of sophisticated static and dynamic analysis techniques to finding errors in programs. Lately he has focused on approaches to finding buffer overruns in C programs and a variety of security vulnerabilities (SQL injections, cross-site scriping, etc.) in Web-based applications. Benjamin has authored more than a dozen papers on program analysis for security and other uses, including finding memory errors, violations of API-specific patterns, software pattern mining, garbage collection, etc. Benjamin is a winner of the NSF graduate fellowship. His industrial experience involves working for companies including Yahoo!, Netscape, and Intel.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
====Jim Roskind (AOL副總裁暨技術長、前Netscape副總裁暨首席科學家、創辦Infoseek)====&lt;br /&gt;
'''題目''': '''''Ajax Security'''''&lt;br /&gt;
&lt;br /&gt;
'''講者簡介''': During 8 years at Netscape/AOL/TW, Dr. Jim Roskind had titles including VP/CTO of System Infrastructure for America Online, VP/Chief Scientist Netscape, Netscape/Netcenter Security Architect, and Netscape's Java Security Architect. Jim's time as the Java Security Architect in Netscape's Client Product Division, placed him in the near the epicenter of almost all security related problems that appeared in the browser. In addition to tasks involved with technically reconciling issues, he was also a common liaison with contributors that reported security issues (both real and imagined). His notable technical accomplishments at Netscape included the architecture and deployment of signed Java. Before joining Netscape in 1995, Jim was a co-founder of Infoseek Corporation, and later Chief Scientist. Dr. Roskind holds an SB Electrical Engineering, SB Computer Science, SM EECS (1980), and PhD EECS (1983), all from Massachusetts Institute of Technology. His current research and development focus is on his daughter Brianna and son Dylan, all studied in collaboration with his wife Melinda.&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
'''OWASP為國際非營利組織，參加此次活動係完全免費，會場寬敞明亮，備有舒適席次。'''&lt;br /&gt;
&lt;br /&gt;
'''然由於場地限制，席次僅提供前200名來信報名者，還請包涵。'''&lt;br /&gt;
&lt;br /&gt;
'''請各位欲參加之會員朋友，務必儘速來信報名參加。'''&lt;br /&gt;
&lt;br /&gt;
===來信報名===&lt;br /&gt;
請email至[mailto:info@owasp.org.tw?subject=OWASP_Taiwan_Registration info@owasp.org.tw]，並註明下列資訊。&lt;br /&gt;
#姓名:&lt;br /&gt;
#單位:&lt;br /&gt;
#職稱:&lt;br /&gt;
#電子郵件:&lt;br /&gt;
#聯絡電話:&lt;br /&gt;
#免費加入OWASP台灣分會:(空白為願意加入，若不欲加入請填否)&lt;br /&gt;
&lt;br /&gt;
===會場位置===&lt;br /&gt;
台灣科技大學國際會議廳，交通資訊請參考:[http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16 http://www.ntust.edu.tw/front/bin/ptlist.phtml?Category=16]。&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue0.gif]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue2.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_2007venue1.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== [http://hitcon.org 第三屆台灣駭客年會(HIT 2007)] ==&lt;br /&gt;
&lt;br /&gt;
今年七月，除了第一屆OWASP台灣分會高峰會議外，[http://hitcon.org 第三屆台灣駭客年會(HIT 2007)]將緊接在OWASP高峰會議後的週末，&lt;br /&gt;
也就是2007年7月21日(週六)至22日(週日)舉行，會議地點定於國立臺灣科技大學公館校區-國際廳，歡迎各界人士踴躍報名參加。&lt;br /&gt;
&lt;br /&gt;
詳情可上 HIT 2007 網站查詢:&lt;br /&gt;
[http://hitcon.org http://www.owasp.org/images/b/b5/Owasp_taiwan_HIT-linkLOGO.gif] http://hitcon.org&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*[http://www.owasp.org.tw/?utm_source=HIT&amp;amp;utm_medium=web OWASP台灣分會網頁(http://www.owasp.org.tw)]&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17809</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17809"/>
				<updated>2007-04-07T00:46:14Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* 會員列表 (Member List) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17808</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17808"/>
				<updated>2007-04-07T00:45:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP台灣分會 部落格 blog */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/d/da/OWASP_Banner_Blog.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png] &lt;br /&gt;
&lt;br /&gt;
[[ OWASP Taiwan Translation temporary page]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Banner_Blog.png&amp;diff=17807</id>
		<title>File:OWASP Banner Blog.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Banner_Blog.png&amp;diff=17807"/>
				<updated>2007-04-07T00:44:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17806</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17806"/>
				<updated>2007-04-07T00:41:18Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP 台灣分會 (OWASP Taiwan Chapter) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/4/45/Owasp_taiwan_chapter_blog_banner_white.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png] &lt;br /&gt;
&lt;br /&gt;
[[ OWASP Taiwan Translation temporary page]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17805</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17805"/>
				<updated>2007-04-07T00:40:50Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: /* OWASP 台灣分會 (OWASP Taiwan Chapter) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝[http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies 美商阿碼科技]提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/4/45/Owasp_taiwan_chapter_blog_banner_white.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png] &lt;br /&gt;
&lt;br /&gt;
[[ OWASP Taiwan Translation temporary page]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17804</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17804"/>
				<updated>2007-04-07T00:39:44Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「網站安全的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
== 歡迎光臨 OWASP 台灣分會 ==&lt;br /&gt;
&lt;br /&gt;
== 歡迎您的參與 ==&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝美商阿碼科技提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/4/45/Owasp_taiwan_chapter_blog_banner_white.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png] &lt;br /&gt;
&lt;br /&gt;
[[ OWASP Taiwan Translation temporary page]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17721</id>
		<title>Taiwan</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Taiwan&amp;diff=17721"/>
				<updated>2007-04-04T13:04:17Z</updated>
		
		<summary type="html">&lt;p&gt;Wayne huang: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:OWASP_TW_Banner.png]]&lt;br /&gt;
&lt;br /&gt;
歡迎加入OWASP台灣分會！「安全Web軟體的第一步，從加入OWASP台灣分會開始」。&lt;br /&gt;
&lt;br /&gt;
台灣分會會長[mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]暨分會工作同仁衷心肯定您的參與，不管您在何處，甚至您僅曾留下網路足跡於台灣，感謝您願意跟大家一起分享，讓我們用更多不同的角度來檢視Web安全的趨勢、威脅、問題與解決方案。&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=台灣分會 OWASP Taiwan |extra=歡迎蒞臨OWASP台灣分會！台灣分會會長為 [mailto:wayne@owasp.org.tw 黃耀文先生（Wayne Huang）]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-taiwan|emailarchives=http://lists.owasp.org/pipermail/owasp-taiwan}}&lt;br /&gt;
&lt;br /&gt;
== 有關OWASP (About OWASP) ==&lt;br /&gt;
OWASP(開放Web軟體安全計畫 - Open Web Application Security Project)是一個開放社群、非營利性組織，目前全球有82個分會近萬名會員，其主要目標是研議協助解決Web軟體安全之標準、工具與技術文件，長期致力於協助政府或企業瞭解並改善網頁應用程式與網頁服務的安全性。由於應用範圍日廣，網頁應用安全已經逐漸的受到重視，並漸漸成為在安全領域的一個熱門話題，在此同時，駭客們也悄悄的將焦點轉移到網頁應用程式開發時所會產生的弱點來進行攻擊與破壞。&lt;br /&gt;
&lt;br /&gt;
美國聯邦貿易委員會(FTC)強烈建議所有企業需遵循OWASP所發佈的十大Web弱點防護守則、美國國防部亦列為最佳實務，國際信用卡資料安全技術PCI標準更將其列為必要元件。目前OWASP有30多個進行中的計畫，包括最知名的OWASP Top 10(十大Web弱點)、WebGoat(代罪羔羊)練習平台、安全PHP/Java/ASP.Net等計畫，針對不同的軟體安全問題在進行討論與研究。&lt;br /&gt;
&lt;br /&gt;
當貴單位決定開放網頁服務時，就必須讓來自於全球的網頁請求進入單位內部的網頁伺服器。駭客可以藉由隱藏在合法的網頁請求內，通過防火牆、入侵偵測系統或其他防禦系統的偵測，堂而皇之的進入單位內部或藉由單位網站充當跳板與中繼站而向其他受害者發動攻擊。這意味著企業的網頁程式碼也必須成為機關(構)單位周邊的安全防護之一，當單位網頁服務的規模與複雜性增加時，單位暴露於外的風險也逐漸增加。&lt;br /&gt;
&lt;br /&gt;
== OWASP 台灣分會 (OWASP Taiwan Chapter) ==&lt;br /&gt;
*網頁:http://www.owasp.org.tw&lt;br /&gt;
*電郵:info@owasp.org.tw&lt;br /&gt;
*群組:owasp-taiwan@lists.owasp.org&lt;br /&gt;
*住址:台北市115南港區三重路19-13號(南港軟體園區)E棟5樓554室&lt;br /&gt;
&lt;br /&gt;
Chapter meetings are held several times a year, typically in the offices of our sponsor. &lt;br /&gt;
&lt;br /&gt;
Please subscribe to the mailing list for meeting announcements.&lt;br /&gt;
&lt;br /&gt;
Our chapter is sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies].&lt;br /&gt;
感謝美商阿碼科技提供會議茶水、食物與活動贊助!&lt;br /&gt;
&lt;br /&gt;
== 免費加入OWASP台灣分會、立刻啟用免費源碼資安檢測！ ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/f/f8/OWASP-TW-1.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入OWASP台灣分會不需任何費用，會員可享有：'''&lt;br /&gt;
&lt;br /&gt;
1. 配合Web安全宣導，政府機關(構)可獲免費資安源碼檢測（靜態分析）線上使用帳號。（廠商贊助，限台灣政府機構）&lt;br /&gt;
&lt;br /&gt;
2. 不定期由OWASP台灣分會發行之Web攻防CDROM，目前為V1.0，填妥入會資料後會由工作人員郵寄送達。V1.0 CDROM內容包括：&lt;br /&gt;
&lt;br /&gt;
##OWASP-Taiwan-Web安全簡介投影片&lt;br /&gt;
##OWASP-Taiwan-2007年首份研討會講義&lt;br /&gt;
##OWASP-Taiwan-免費Web安全工具&lt;br /&gt;
##OWASP-Top10-最新十大Web弱點&lt;br /&gt;
##OWASP-代罪羔羊(WebGoat)工具(免下載)&lt;br /&gt;
##OWASP-Guide-參考指引計畫內容&lt;br /&gt;
##OWASP測試計畫內容&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/member/registration.php http://www.owasp.org/images/d/d9/OWASP-TW-2.jpg]&lt;br /&gt;
&lt;br /&gt;
3. OWASP台灣分會電子報。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''加入會員方法請見本頁下方'''&amp;lt;/font&amp;gt; '''[[#如何加入會員|如何加入會員]]'''&lt;br /&gt;
&lt;br /&gt;
加入OWASP台灣分會不需任何費用，會員資格完全開放給任何對於應用程式安全有興趣的人士，&amp;lt;br&amp;gt;&lt;br /&gt;
我們鼓勵會員於OWASP台灣分會分享他們的知識並提供專題演講，&amp;lt;br&amp;gt;&lt;br /&gt;
而在加入會員前，請您仔細閱讀[https://www.owasp.org/index.php/Chapter_Rules 分會會員手則]。&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
若要加入本分會的mailing list，請連結到[http://lists.owasp.org/mailman/listinfo/owasp-taiwan mailing list]網頁，&amp;lt;br&amp;gt;&lt;br /&gt;
所有的活動討論與活動地點將透過這個清單來討論，&amp;lt;br&amp;gt;&lt;br /&gt;
您也可以從[http://lists.owasp.org/pipermail/owasp-taiwan/ email 討論備份]中找到我們之前討論的備份。&lt;br /&gt;
&lt;br /&gt;
最後提醒您，參加活動前，請再次檢查您mailing list的信件以確定活動地點與時間，或是任何有關活動記錄的事項。&lt;br /&gt;
&lt;br /&gt;
== OWASP台灣分會 部落格 blog ==&lt;br /&gt;
&amp;lt;font color=&amp;quot;#FF0000&amp;quot;&amp;gt;需要一手資安情報，技術分析，市場資訊嗎？&lt;br /&gt;
&lt;br /&gt;
歡迎常來 [http://www.owasp.org.tw/blog OWASP台灣分會 部落格 blog]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw/blog http://www.owasp.org/images/4/45/Owasp_taiwan_chapter_blog_banner_white.png]&lt;br /&gt;
&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 如何加入會員 ==&lt;br /&gt;
歡迎免費加入OWASP Taiwan台灣分會！加入方式有三種，線上報名，email報名以及傳真報名：&lt;br /&gt;
工作同仁會持續通知所有會員有關OWASP最新活動資訊與座談會議程.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 線上報名 ===&lt;br /&gt;
請[http://www.owasp.org.tw/member/registration.php 按此填寫線上報名單]&lt;br /&gt;
&lt;br /&gt;
=== Email報名 ===&lt;br /&gt;
請email：[mailto:info@owasp.org.tw info@owasp.org.tw]加入台灣分會,請註明下列資訊.&lt;br /&gt;
#姓名&lt;br /&gt;
#單位&lt;br /&gt;
#職稱&lt;br /&gt;
#電子郵件&lt;br /&gt;
#聯絡電話&lt;br /&gt;
&lt;br /&gt;
=== 傳真報名 ===&lt;br /&gt;
請列印此報名表,填寫後傳真至(02)6616-1100即可.&lt;br /&gt;
&lt;br /&gt;
[[Image:owasp_taiwan_opening.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
== 近期消息 ==&lt;br /&gt;
&lt;br /&gt;
*March 28 to April 11, 2007: We welcome your join to the [http://sid.iii.org.tw/96Q1_ISMS/ Web Application Security] seminar held by Taiwan government.&lt;br /&gt;
*在2007年3月27至4月11日，行政院研考會與資通安全會報技服中心舉辦之[http://sid.iii.org.tw/96Q1_ISMS/ 政府資通安全防護巡迴研討會－資安發展趨勢及網路應用服務資訊安全]，歡迎政府機關(構)負責資通安全相關人員踴躍參加。&lt;br /&gt;
&lt;br /&gt;
*April 16 to 18, 2007: [http://www.owasp.org/index.php/Taiwan OWASP-Taiwan] charter hosts a booth ([http://www.secutech.com/tw/is/images/istw_b01.swf A402, A404], sponsored by [http://www.armorize.com/?utm_source=OWASP%2BTW%2BMain&amp;amp;utm_medium=web Armorize Technologies, Inc.]) at [http://www.secutech.com/tw/is/index.asp Info Security Taipei 2007]. Come and vist us~&lt;br /&gt;
*在2007年4月16至18日，台北國際資安展(http://www.secutech.com/tw/is/index.asp) 隆重登場，OWASP台灣分會邀您蒞臨攤位A402與A404，即可獲得Web資安光碟一張，並親自動手體驗比滲透測試、弱點稽核等傳統資安檢測方式更為優異的自動源碼檢測技術。&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp taiwan first gathering.png]]&lt;br /&gt;
&lt;br /&gt;
== 網站與Web服務的五大資安困境 ==&lt;br /&gt;
#IT人員不足&lt;br /&gt;
#缺乏資安領域專業知識&lt;br /&gt;
#功能性驗收為主&lt;br /&gt;
#缺乏自動化工具&lt;br /&gt;
#成本、效率導向專案模式不利確保專案品質&lt;br /&gt;
&lt;br /&gt;
==最新2007年OWASP十大Web資安漏洞 (2007 OWASP Top 10)==&lt;br /&gt;
===直接與程式碼安全品質有關===&lt;br /&gt;
註:美國國防部的BSI計畫(Build-Security In,https://buildsecurityin.us-cert.gov/) 及Mitre研究機構的CVE資安脆弱性列表(http://cve.mitre.org/) 亦顯示1)Cross Site Scripting與2)SQL Injection已連續兩年列為全球頭號嚴重資安弱點. &lt;br /&gt;
*[必要*]Cross Site Scripting (XSS) – 跨站腳本攻擊(即XSS) &lt;br /&gt;
*[必要*]Injection Flaws – 注入弱點(如SQL Injection等資料隱碼攻擊) &lt;br /&gt;
*[建議*]Insecure Remote File Include – 不安全的遠端檔案匯入(如File Inclusion) &lt;br /&gt;
*[建議*]Insecure Direct Object Reference –不安全的物件參考(如File Injection) &lt;br /&gt;
*[選擇*]Cross Site Request Forgery (CSRF) – 跨站冒名請求(類似XSS破壞身份鑑別) &lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt;OWASP台灣分會強烈建議各單位在進行源碼檢測時，尤以政府機關(構)，應遵循政府資通安全作業規範(http://www.giscc.org.tw) 之「Web應用程式安全參考指引」，並將1與2列為必要檢測項目，3與4列為建議檢測項目，而5列為選擇檢測項目。 &lt;br /&gt;
&lt;br /&gt;
＊在實務案例上，檢測並修正1與2即可避免絕大多數的Web資安威脅。&lt;br /&gt;
&lt;br /&gt;
===因上述漏洞間接造成或與Web伺服器及外部設定有關===&lt;br /&gt;
*Information Leakage and Improper Error Handling &lt;br /&gt;
*Broken Authentication and Session Management &lt;br /&gt;
*Insecure Cryptographic Storage &lt;br /&gt;
*Insecure Communications &lt;br /&gt;
*Failure to Restrict URL Access&lt;br /&gt;
&lt;br /&gt;
== 會員列表 (Member List) ==&lt;br /&gt;
Coming up soon!&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org.tw http://www.owasp.org.tw/dot.png] &lt;br /&gt;
&lt;br /&gt;
[[ OWASP Taiwan Translation temporary page]]&lt;/div&gt;</summary>
		<author><name>Wayne huang</name></author>	</entry>

	</feed>