<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Weilin+Zhong</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Weilin+Zhong"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Weilin_Zhong"/>
		<updated>2026-04-30T02:02:07Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121117</id>
		<title>Global Industry Committee - Application 15</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_15&amp;diff=121117"/>
				<updated>2011-12-05T16:16:13Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Weilin Zhong added endorsement for Frank.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Frank Fan&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP China VP&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Helen  Gao&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Long Island Chapter Founder &amp;amp; Leader, Global Membership Comittee&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I first met Frank at the OWASP conference in 2010. Frank is one of the most intelligent entrepreneurs and infosec experts I have ever met. Frank's company has been one of the main sponsors of the past two OWASP conferences in China. As a matter of fact, Frank has volunteered to host the OWASP submit in 2013. Frank's education and experience in both US and China is rare, especially among OWASP leaders. I am confident that he will be an asset to OWASP.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ivy Zhang&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Member of China Chapter&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Being the VP of China Chapter, Frank also has more than ten years experience in US. His experience and knowledge is crucial in OWASP's mission &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Tin Zaw&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Los Angeles Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Frank is a highly-respected, well-connected, successful  engineer/businessman in China and he is very committed to success of OWASP, in China and globally. These attributes make him an ideal candidate for the Industry Committee. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Weilin Zhong&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Lead of Top 10 Chinese Project&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I worked with Frank for the OWASP China Summit 2010 hosted in Beijing. He was one of the key members of the summit organization committee and the local host.  Frank was not only a security expert but also a security entrepreneur with rich understanding of both the American and the Chinese security industries and communities. He is resourceful and well-connected. He provided great support for the summit and showed strong commitment of promoting both OWASP and application security in the China and Asian areas.  His unique combination of US and Chinese education backgrounds, industrial experiences and leaderships positions him well for prompting OWASP in a global level and connecting to international communities . I am sure he will be a great asset for OWASP. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_8&amp;diff=106697</id>
		<title>Global Conferences Committee - Application 8</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_8&amp;diff=106697"/>
				<updated>2011-03-12T02:19:53Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Zhendong Yu&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|One of the early OWASP DC chapter members, leader of OWASP Chinese project, organizer for OWASP China Summit 2010.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Helen Gao&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Leader of OWASP Chinese Project, Founder and leader of OWASP Long Island Chapter, Representative of OWASP China Chapter&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I worked with Zhendong when organizing the China conference last year as well as the Chinese Project.  He is one of the smartest and most hardworking persons I know.  He is fluent in Chinese and very familiar with the Chinese culture.  I have no doubt that Zhendong will be instrumental in bridging OWASP and the vast Chinese community.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Weilin Zhong&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Leader, OWASP Chinese Project; Overseas Organizer, OWASP China Summit 2010 &lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I have been working with Zhendong on different OWASP projects and highly recommend him. I believe he will further OWASP's cause in Asia, and the globe.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91455</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91455"/>
				<updated>2010-10-15T08:56:02Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Kenny Lee */ - corrected the link to the Chinese Executive Summary&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
*[http://www.owasp.org/images/c/c1/201008_DBIR_Executive_Summary_CHT_Final.pdf Executive Summary in Chinese (中文摘要）]&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: &lt;br /&gt;
[http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif]&lt;br /&gt;
[http://www.it168.com/ http://www.it168.com/himages/logo.gif]&lt;br /&gt;
[http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif]&lt;br /&gt;
[http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg]&lt;br /&gt;
[http://www.ccidnet.com/, http://image.ccidnet.com/www/logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91453</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91453"/>
				<updated>2010-10-15T08:51:30Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Kenny Lee */  - linked a Chinese Executive Summary&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
*[http://www.owasp.org/index.php/File:201008_DBIR_Executive_Summary_CHT_Final.pdf Executive Summary in Chinese (中文摘要）]&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: &lt;br /&gt;
[http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif]&lt;br /&gt;
[http://www.it168.com/ http://www.it168.com/himages/logo.gif]&lt;br /&gt;
[http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif]&lt;br /&gt;
[http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg]&lt;br /&gt;
[http://www.ccidnet.com/, http://image.ccidnet.com/www/logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91452</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91452"/>
				<updated>2010-10-15T08:46:59Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Kenny Lee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
* [http://www.owasp.org/index.php/File:201008_DBIR_Executive_Summary_CHT_Final.pdf Chinese Executive Summary (中文摘要）]&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: &lt;br /&gt;
[http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif]&lt;br /&gt;
[http://www.it168.com/ http://www.it168.com/himages/logo.gif]&lt;br /&gt;
[http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif]&lt;br /&gt;
[http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg]&lt;br /&gt;
[http://www.ccidnet.com/, http://image.ccidnet.com/www/logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91451</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91451"/>
				<updated>2010-10-15T08:45:54Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Kenny Lee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
* [http://www.owasp.org/index.php/File:201008_DBIR_Executive_Summary_CHT_Final.pdf Chinese Executive Summary (中文摘要）]&lt;br /&gt;
&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: &lt;br /&gt;
[http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif]&lt;br /&gt;
[http://www.it168.com/ http://www.it168.com/himages/logo.gif]&lt;br /&gt;
[http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif]&lt;br /&gt;
[http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg]&lt;br /&gt;
[http://www.ccidnet.com/, http://image.ccidnet.com/www/logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:201008_DBIR_Executive_Summary_CHT_Final.pdf&amp;diff=91450</id>
		<title>File:201008 DBIR Executive Summary CHT Final.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:201008_DBIR_Executive_Summary_CHT_Final.pdf&amp;diff=91450"/>
				<updated>2010-10-15T08:44:25Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91449</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91449"/>
				<updated>2010-10-15T07:00:43Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Media Partners: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: &lt;br /&gt;
[http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif]&lt;br /&gt;
[http://www.it168.com/ http://www.it168.com/himages/logo.gif]&lt;br /&gt;
[http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif]&lt;br /&gt;
[http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg]&lt;br /&gt;
[http://www.ccidnet.com/, http://image.ccidnet.com/www/logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91448</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91448"/>
				<updated>2010-10-15T06:57:47Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (详细会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91447</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91447"/>
				<updated>2010-10-15T06:56:47Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Linked the Chinese Agenda in the Agenda page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
[http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=56&amp;amp;Itemid=82 '''Detailed Agenda in Chinese (中文会议日程)'''].&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91446</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91446"/>
				<updated>2010-10-15T06:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Gold Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Kenny Lee, one of the contributors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.barracudanetworks.com/ http://www.owasp.org.cn/images/stories/logo.png] &lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91276</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91276"/>
				<updated>2010-10-12T15:40:51Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Conference Committee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
* [mailto:ivy@owasp.org.cn, Ivy Zhang] 张小姐 - OWASP China Summit Secretary, OWASP China-Mainland Chapter, 会务秘书&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91275</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91275"/>
				<updated>2010-10-12T15:35:44Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Organizers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Chair]&lt;br /&gt;
**[mailto:Ivy@owasp.org.cn Ivy Zhang] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter Summit Secretary]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91233</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91233"/>
				<updated>2010-10-11T20:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Organizers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
** [mailto:ggf.ish@gmail.com Zhendong Yu]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggf.ish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, Co-Founder, VP Engineering, Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91165</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91165"/>
				<updated>2010-10-11T08:58:05Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Updated Agenda for Verizon &amp;amp; Pravir's talk.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/5/58/Bio_-_Kenny_Lee_2010.pdf Kenny Lee], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Building an effective SSA program in measurable iterations]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Kenny Lee =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
== Building an effective SSA program in measurable iterations ==&lt;br /&gt;
===== Pravir Chandra =====&lt;br /&gt;
Integrating security activities into the software development process remains a challenge for most organizations despite the existence of several secure SDLC models. We've learned from experience that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; require answers customized to each organization and there are no simple, one-size-fits-all answers.&lt;br /&gt;
To help organizations find their own answers, this session will introduce the Open Software Assurance Maturity Model (OpenSAMM), a flexible framework for building a balanced software security assurance (SSA) program. Using the framework, attendees will learn how to self-assess their security activities and use roadmap templates to improve in small and measurable iterations. We'll also talk about several real-world case studies that demonstrate the framework in action.  Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/.&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Bio_-_Kenny_Lee_2010.pdf&amp;diff=91164</id>
		<title>File:Bio - Kenny Lee 2010.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Bio_-_Kenny_Lee_2010.pdf&amp;diff=91164"/>
				<updated>2010-10-11T08:51:18Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91075</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91075"/>
				<updated>2010-10-08T16:12:27Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Sponsor US! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/6/65/Mark_goudie.pdf Mark Goudie], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Mark Goudie =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/1/17/OWASP_China_Summit_2010_Investment_Guide.pdf English]][[http://www.owasp.org/images/6/66/OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf Chinese]]. Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf&amp;diff=91074</id>
		<title>File:OWASP China Summit 2010 Investment Guide Chinese.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_China_Summit_2010_Investment_Guide_Chinese.pdf&amp;diff=91074"/>
				<updated>2010-10-08T16:08:43Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_China_Summit_2010_Investment_Guide.pdf&amp;diff=91072</id>
		<title>File:OWASP China Summit 2010 Investment Guide.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_China_Summit_2010_Investment_Guide.pdf&amp;diff=91072"/>
				<updated>2010-10-08T16:03:49Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91071</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91071"/>
				<updated>2010-10-08T16:02:47Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf OWASP十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/6/65/Mark_goudie.pdf Mark Goudie], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Mark Goudie =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91070</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91070"/>
				<updated>2010-10-08T15:59:49Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/OWASPTop10-2010-PressRelease OWASP TOP 10] &lt;br /&gt;
[http://www.owasp.org/images/a/a7/OWASP_Top_10_PR_Chinese.pdf 十大风险]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/6/65/Mark_goudie.pdf Mark Goudie], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Mark Goudie =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_PR_Chinese.pdf&amp;diff=91069</id>
		<title>File:OWASP Top 10 PR Chinese.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10_PR_Chinese.pdf&amp;diff=91069"/>
				<updated>2010-10-08T15:51:06Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=91066</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=91066"/>
				<updated>2010-10-08T15:35:49Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Updated Weilin's Email.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Book|1400974}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;br&amp;gt; '''Do You Recommend the OWASP TOP 10?''' Tweet a sign of support [http://twitter.com/home/?status=OWASP+has+FREE+practical+software+development+and+security+resources:+http://bit.ly/bMb0SM Click Here] &amp;lt;/center&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Main  ====&lt;br /&gt;
&lt;br /&gt;
'''Welcome to the OWASP Top Ten Project''' &lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 for 2010 ==&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 we released the final version of the OWASP Top 10 for 2010, and here is the associated [[OWASPTop10-2010-PressRelease | press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009.&lt;br /&gt;
&lt;br /&gt;
Click one of the links below to download from one of our mirrors:&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP_Top_10_-_2010.pdf (Google Code)]&lt;br /&gt;
* [https://docs.google.com/uc?export=download&amp;amp;id=0B3B7xlV22G8TNGUyOTFjMjAtZDJjMi00MjM4LTlmNGUtMzFiODdjMTA2OTZm OWASP_Top_10_-_2010.pdf (Google Docs)]&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 Web Application Security Risks for 2010 are:&lt;br /&gt;
*A1: Injection &lt;br /&gt;
*A2: Cross-Site Scripting (XSS) &lt;br /&gt;
*A3: Broken Authentication and Session Management &lt;br /&gt;
*A4: Insecure Direct Object References &lt;br /&gt;
*A5: Cross-Site Request Forgery (CSRF) &lt;br /&gt;
*A6: Security Misconfiguration &lt;br /&gt;
*A7: Insecure Cryptographic Storage &lt;br /&gt;
*A8: Failure to Restrict URL Access &lt;br /&gt;
*A9: Insufficient Transport Layer Protection&lt;br /&gt;
*A10: Unvalidated Redirects and Forwards &lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the world!!!&lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize:&lt;br /&gt;
* OWASP is reaching out to developers, not just the application security community&lt;br /&gt;
* The Top 10 is about managing risk, not just avoiding vulnerabilities&lt;br /&gt;
* To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
If you are interested in doing a presentation on the OWASP Top 10, please feel free to use all or parts of this: [http://owasptop10.googlecode.com/files/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
&lt;br /&gt;
== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. Translation efforts for the 2010 version are underway and they will be posted as they become available.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications do not contain these flaws. Adopting the OWASP Top Ten is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code. &lt;br /&gt;
&lt;br /&gt;
== Versions ==&lt;br /&gt;
&lt;br /&gt;
Stable: &lt;br /&gt;
&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF]&lt;br /&gt;
* [[Top_10_2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations:&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF]&lt;br /&gt;
* [http://www.securityplus.or.kr/xe/?module=file&amp;amp;act=procFileDownload&amp;amp;file_srl=25999&amp;amp;sid=00866c962d596769cb97cd9fadb81947 OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
* [http://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [http://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Old versions:&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF]&lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]]&lt;br /&gt;
*[http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here]&lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Users and Adopters ==&lt;br /&gt;
&lt;br /&gt;
The U.S. Federal Trade Commission strongly recommends that all companies use the OWASP Top Ten and ensure that their partners do the same. In addition, the U.S. Defense Information Systems Agency (DISA) has listed the OWASP Top Ten as key best practices that should be used as part of the DoD Information Assurance Certification and Accreditation Process ([http://iase.disa.mil/diacap/ DIACAP]). &lt;br /&gt;
&lt;br /&gt;
In the commercial market, the [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf Payment Card Industry (PCI) standard] has adopted the OWASP Top Ten, and requires (among other things) that all merchants get a security code review for all their custom code. In addition, a broad range of companies and agencies around the globe are also using the OWASP Top Ten, including: &lt;br /&gt;
&lt;br /&gt;
*A.G. Edwards &lt;br /&gt;
*Bank of Newport &lt;br /&gt;
*Best Software &lt;br /&gt;
*British Telecom &lt;br /&gt;
*Bureau of Alcohol, Tobacco, and Firearms (ATF) &lt;br /&gt;
*Citibank &lt;br /&gt;
*Cboss Internet &lt;br /&gt;
*Cognizant &lt;br /&gt;
*Contra Costa County, CA &lt;br /&gt;
*Corillian Corporation &lt;br /&gt;
*Digital Payment Technologies &lt;br /&gt;
*Foundstone Strategic Security&lt;br /&gt;
*HP&lt;br /&gt;
*IBM Global Services &lt;br /&gt;
*National Australia Bank &lt;br /&gt;
*Norfolk Southern &lt;br /&gt;
*OneSAS.com&lt;br /&gt;
*Online Business Systems &lt;br /&gt;
*Predictive Systems &lt;br /&gt;
*Price Waterhouse Coopers &lt;br /&gt;
*Recreational Equipment, Inc. (REI) &lt;br /&gt;
*SSP Solutions &lt;br /&gt;
*Samsung SDS (Korea) &lt;br /&gt;
*Sempra Energy &lt;br /&gt;
*Sprint &lt;br /&gt;
*Sun Microsystems &lt;br /&gt;
*Swiss Federal Institute of Technology &lt;br /&gt;
*Symantec &lt;br /&gt;
*Texas Dept of Human Services &lt;br /&gt;
*The Hartford &lt;br /&gt;
*Zapatec &lt;br /&gt;
*ZipForm &lt;br /&gt;
*...and many others&lt;br /&gt;
&lt;br /&gt;
Several schools have also adopted the OWASP Top Ten as a part of their curriculum, including Michigan State University (MSU), and the University of California at San Diego (UCSD). &lt;br /&gt;
&lt;br /&gt;
Several open source projects have adopted the OWASP Top Ten as part of their security audits, including: &lt;br /&gt;
&lt;br /&gt;
*[http://plone.org Plone open source CMS project] (managed by the Plone Foundation)&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the Top Ten. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top Ten useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top Ten mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
The OWASP Top Ten project is sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif] [http://www.softtek.com http://www.owasp.org/images/a/a8/AppSecDC2009-Sponsor-softtek.gif]&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== 2010 Translation Efforts ====&lt;br /&gt;
&lt;br /&gt;
Efforts are underway in numerous languages to translate the OWASP Top 10. If you are interested in helping, please contact the other members of the team for the language you are interested in contribution to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language too!!&lt;br /&gt;
&lt;br /&gt;
Volunteer Translators:&lt;br /&gt;
* French: sebastien.gioria@owasp.org, ludovic.petit@sfr.com, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com&lt;br /&gt;
* German: kai.jendrian@secorvo.de&lt;br /&gt;
* Spanish: juan.calderon@ge.com, fcerullo@owasp.org, jaguasch@gmail.com, paulocoronado@gmail.com, rodrigo@rmarcos.com, vicente.aguilera@owasp.org&lt;br /&gt;
* Portuguese: carlos.j.serrao@gmail.com; wagner.elias@owasp.org; victoreufrasio@gmail.com; leo.cavallari@owasp.org; victoreufrasio@gmail.com; &lt;br /&gt;
* Greek: Konstantinos Papapanagiotou (conpap@di.uoa.gr)&lt;br /&gt;
* Turkish: bora@abi.com.tr&lt;br /&gt;
* Chinese: weilin.zhong@owasp.org&lt;br /&gt;
* Malay, Japanese, Vietnamese: cecil.su@owasp.org&lt;br /&gt;
* Korean: Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
&lt;br /&gt;
==== Project Details  ====&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
==== Spanish Translation ====&lt;br /&gt;
&lt;br /&gt;
La traduccion al español del OWASP Top 10 2010 ya esta en camino... visita esta pagina frecuentemente para visualizar los avances y obtener una copia de la ultima version.&lt;br /&gt;
&lt;br /&gt;
El equipo de traductores esta compuesto por:&lt;br /&gt;
&lt;br /&gt;
- Aguilera, Vicente&lt;br /&gt;
&lt;br /&gt;
- Cabezas Molina, Daniel&lt;br /&gt;
&lt;br /&gt;
- Calderon, Juan&lt;br /&gt;
&lt;br /&gt;
- Cerullo, Fabio&lt;br /&gt;
&lt;br /&gt;
- Coronado, Paulo&lt;br /&gt;
&lt;br /&gt;
- Guasch, Jose Antonio&lt;br /&gt;
&lt;br /&gt;
- Marcos, Rodrigo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== How Are Companies/Projects/Vendors Using the OWASP Top 10? ====&lt;br /&gt;
&lt;br /&gt;
Click the links for more details on each use!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Warning&amp;lt;/b&amp;gt;: these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (waf) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective.&lt;br /&gt;
&lt;br /&gt;
; [http://blogs.msdn.com/b/sdl/archive/2008/05/01/sdl-and-the-owasp-top-ten.aspx Microsoft]&lt;br /&gt;
: as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
; [http://www.nsa.gov/applications/search/index.cfm?q=owasp NSA]&lt;br /&gt;
: in their developer guidance on web application security&lt;br /&gt;
&lt;br /&gt;
; [https://www.pcisecuritystandards.org/index.shtml PCI Council]&lt;br /&gt;
: as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
; [http://community.citrix.com/display/ocb/2010/06/02/NetScaler+Application+Firewall+and+the+OWASP+Top+10+2010 Citrix]&lt;br /&gt;
: in a guide showing how to configure their NetScalar product&lt;br /&gt;
&lt;br /&gt;
; [http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft]&lt;br /&gt;
: to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
; [http://www.web2py.com/examples/default/security web2py]&lt;br /&gt;
: to demonstrate the security of this Python web framework&lt;br /&gt;
&lt;br /&gt;
; [http://www.owasp.org/index.php/Commentary_OWASP_Top_Ten_2004_Project Oracle]&lt;br /&gt;
: for developer awareness&lt;br /&gt;
&lt;br /&gt;
; [http://www.theatremanagerhelp.com/book/export/html/1640 TheatreManager]&lt;br /&gt;
: to show how their product is secure for web use&lt;br /&gt;
&lt;br /&gt;
; [http://knol.google.com/k/automated-vulnerabilty-scanners-and-the-owasp-top-10# WhiteHat]&lt;br /&gt;
: as a way to explain the coverage of their service&lt;br /&gt;
&lt;br /&gt;
; [http://www.imperva.com/docs/TB_SecureSphere_OWASP_2010-Top-Ten.pdf Imperva]&lt;br /&gt;
: to show the coverage of the SecureSphere tool&lt;br /&gt;
&lt;br /&gt;
; [http://blog.cenzic.com/public/item/254309 Cenzic]&lt;br /&gt;
: to enable &amp;quot;focused scans for compliance testing with the updated PCI standard&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91061</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91061"/>
				<updated>2010-10-08T15:03:53Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Organizing Partners: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/6/65/Mark_goudie.pdf Mark Goudie], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Mark Goudie =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] &lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91060</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91060"/>
				<updated>2010-10-08T15:03:11Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Gold Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Application Security Market Trend 应用安全市场动态]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/6/65/Mark_goudie.pdf Mark Goudie], Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[#2010 Data Breach Investigation Report]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Application Security Market Trend 应用安全市场动态 ==&lt;br /&gt;
=====Chenxi Wang, PhD===== &lt;br /&gt;
应用安全是很多企业安全部门的重要运行目标。在这个报告中我们将分析全球应用安全市场动态，并看一下世界的一些领先机构是怎样在内部推广和运行应用安全产品。我们将分析一些金融界和保险行业的成功案例 ，看一下这些公司是怎样把应用安全产品分门别类融进他们的日常运行程序，并怎样克服运行中遇到的困难。最后我们还将讨论应用安全产品的发展和研究趋势。&lt;br /&gt;
== Outbound Monitoring of Web Servers: a Forgotten Child in Information Security? ==&lt;br /&gt;
===== Wong Onn Chee =====&lt;br /&gt;
Outbound monitoring of enterprise web servers is an oft-neglected aspect in the overall security of an enterprise web infrastructure.When outbound monitoring is missing, risks from information leakage and transmission of malware are ever present. Onn Chee will walk through the most common causes of information leakage and malware transmission from web servers. Anonymised case studies of major US and Chinese organisations will be presented for the audience to have a better understanding.&lt;br /&gt;
== 2010 Data Breach Investigation Report ==&lt;br /&gt;
===== Mark Goudie =====&lt;br /&gt;
This presentation is based on the Verizon Business Data Breach Investigations  Report1 (DBIR) and will be delivered by Mark Goudie, one of the co‐authors of  the report.  The DBIR is a collaborative effort between the United States Secret  Service Cyber Intelligence Section and Verizon Business to collect and analyse  what we believe to be the world’s largest study of data breaches consisting of  over 900 cases and 900 million compromised records across six years of first  hand forensic investigations.   &lt;br /&gt;
We have learned a great deal from this journey and we’re glad to have the  opportunity to share these findings with you.  As always, our goal is that the data  and analysis presented in this report prove helpful to the planning and security  efforts of the audience.   Many of the lessons learnt from this study strongly  indicated the need for improvements in web application security.    Data breaches are often a series of simple oversights that culminate in a  significant event where huge amounts of data are stolen.  We will discuss the  most common issues through the use of statistics, war stories and case studies.   Key recommendations will be discussed that we believe will help your  organisation not be the next victim of a data breach. &lt;br /&gt;
More information can be found at [http://www.verizonbusiness.com/databreach/ Verizon Business website].&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
[http://www.honkwin.com/ http://www.honkwin.com/images/demo_03.gif]红科网安(北京)科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
[http://www.nsace.org.cn http://www.nsace.org.cn/templets/images/toplogo.gif]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91059</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91059"/>
				<updated>2010-10-08T15:00:07Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深应用安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two boys and lives with her family in Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职于美国领先的应用安全咨询公司Apsect Security 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确了解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91058</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91058"/>
				<updated>2010-10-08T14:58:46Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深应用安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two boys and lives with her family in Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职于美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确了解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91056</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91056"/>
				<updated>2010-10-08T14:38:04Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two boys and lives with her family in Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职于美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确了解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做研究和开发工作，涉及多个信息安全领域，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91035</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91035"/>
				<updated>2010-10-07T22:22:05Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Application Security Expert */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91034</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91034"/>
				<updated>2010-10-07T22:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Updated the logistic page with hotel information.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Hotel Booking ===&lt;br /&gt;
* Mention attending the &amp;quot;OWASP China Summit&amp;quot;, you can get the discount prices. &lt;br /&gt;
* The summit local team is happy to book the hotel for you, please contact:&lt;br /&gt;
** Peter Zhang&lt;br /&gt;
** Email: market02@owasp.org.cn&lt;br /&gt;
** Tel: 010-85655622&lt;br /&gt;
** Fax: +86-10-85653108&lt;br /&gt;
* For more detail information, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=58&amp;amp;Itemid=85 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91029</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91029"/>
				<updated>2010-10-07T21:04:19Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Supporting Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] 华为&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91028</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91028"/>
				<updated>2010-10-07T21:03:49Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Diamond Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91027</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91027"/>
				<updated>2010-10-07T21:03:26Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Diamond Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 &lt;br /&gt;
&lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91026</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91026"/>
				<updated>2010-10-07T21:02:28Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Media Partners: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: [http://www.chinabyte.com/ http://image.chinabyte.com/w/pic/logo.gif],[http://www.it168.com/ http://www.it168.com/himages/logo.gif][http://www.51cto.com http://images.51cto.com/images/index/Images/Logo.gif], [http://www.cww.net.cn/ http://www.cww.net.cn/images/top_logo.jpg], CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91025</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91025"/>
				<updated>2010-10-07T20:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Educational Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所 [http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91024</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91024"/>
				<updated>2010-10-07T20:56:44Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Organizing Partners: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif] [http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91023</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91023"/>
				<updated>2010-10-07T20:56:20Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Diamond Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息 [http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91022</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91022"/>
				<updated>2010-10-07T20:47:38Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深应用安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91021</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91021"/>
				<updated>2010-10-07T20:46:12Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深应用安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中科技大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91020</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91020"/>
				<updated>2010-10-07T20:43:02Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Gold Sponsors: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
[http://www.ankki.com/ http://www.owasp.org.cn/images/stories/ankkilog.png]深圳昂楷科技有限公司&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91019</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91019"/>
				<updated>2010-10-07T20:37:46Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: updated agenda.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
----&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91018</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91018"/>
				<updated>2010-10-07T20:25:35Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.verizonbusiness.com/databreach/ 2010 Data Breach Investigation Report]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
----&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91017</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91017"/>
				<updated>2010-10-07T20:18:18Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* Trainer Bios &amp;amp; Course Abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the [http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83 summit Chinese website (详情请见峰会中文网站）].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | 2010 Data Breach Investigation Report&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
----&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91016</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91016"/>
				<updated>2010-10-07T20:14:11Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: updated agenda&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the summit Chinese website (详情请见峰会中文网站）：&lt;br /&gt;
** http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research) Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP TOP 10]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | 2010 Data Breach Investigation Report&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM OWASP OpenSAMM Project]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
----&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91014</id>
		<title>OWASP China Summit 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_China_Summit_2010&amp;diff=91014"/>
				<updated>2010-10-07T20:11:11Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: Link speakers bios in the agenda &amp;amp; add hotel map.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
[[Image:OWASP_China_logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
====Welcome====&lt;br /&gt;
&lt;br /&gt;
===OWASP China Summit 2010 - Beijing China===&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]will host '''OWASP China Summit 2010''' in Beijing China on Oct 20-23, 2010, with two days of training followed by two days of conference. The summit will gather OWASP leaders, security experts, executives, technical thought leaders, developers, scientists and researchers from China and around the world for in-depth discussions of cutting-edge application security issues. The summit will draw participation from major Chinese and global organizations across various verticals including government, information technology, services and consulting, telecommunications, finance, e-commerce, Internet, universities and research institutes. About 800 people are expected to attend the summit, which will be covered by major news media. Panel discussions, vendor exhibit, and dinners will be held at the summit, providing sufficient networking opportunities.&lt;br /&gt;
&lt;br /&gt;
'''Press Release: [http://www.owasp.org/images/d/d8/OWASP_China_Summit_2010_Announcement.pdf OWASP China Summit 2010 Announcement]'''&lt;br /&gt;
&lt;br /&gt;
====中文(Chinese)====&lt;br /&gt;
&lt;br /&gt;
===中文网站===&lt;br /&gt;
&lt;br /&gt;
本次会议设有专门的中文网站： [http://www.owasp.org.cn/ OWASP 2010 中国峰会中文网站]。&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
Please [http://www.eventbrite.com/event/735697491 register] yourself to attend the OWASP China Summit. General admission is FREE.&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend OWASP China Summit 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
&lt;br /&gt;
Questions, please contact: [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
==== Training: Oct 20 - 21 ====&lt;br /&gt;
----&lt;br /&gt;
===== Training Agenda =====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;6&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Training Oct 20 - Oct 21''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Trainer&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Topic&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (Before Oct.10)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Price (After Oct.10)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Yuezhong Bao, Microsoft&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Secure Development Lifecycle&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 20 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Benson Wu, Armorize&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Code Review&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | AM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Xin Fang, VulnHunt&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | PM Oct 21 &lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Aaron, DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Security Testing&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1000 ($150)&lt;br /&gt;
| style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | RMB 1500 ($230)&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===== Enrollment &amp;amp; Questions: ===== &lt;br /&gt;
* Ivy: 13510601178, Ivy@owasp.org.cn&lt;br /&gt;
* Rip: 13699898080, rip@owasp.org.cn&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
===== Trainer Bios &amp;amp; Course Abstracts =====&lt;br /&gt;
* More details, please see the summit Chinese website (详情请见峰会中文网站）：&lt;br /&gt;
** http://www.owasp.org.cn/index.php?option=com_content&amp;amp;view=article&amp;amp;id=57&amp;amp;Itemid=83&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
==== Agenda: Oct 22 ====&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - Oct 22, 2010 Tentative''' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | Time &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Speaker&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot;  | Presentation&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Language&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:30-09:00 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Networking&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-09:10 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/China-Mainland, Rip Torn], OWASP China Chapter and [http://www.owasp.org/index.php/User:Brennan, Tom Brennan] OWASP Board&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Opening Statement: Welcome to OWASP China Summit 2010&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:10-10:00 &lt;br /&gt;
| style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Keynote: [http://www.owasp.org/index.php/Chenxi_Wang,_Ph.D._(Forrester_Research), Chenxi Wang], PhD, Forrester Research&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Application Security Market Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Weilin_Zhong, Weilin Zhong], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project, OWASP TOP 10]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:50-11:20 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/Frank_Yuan_Fan,_OWASP_China_Chapter, Frank Fan], DBAppSecurity&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Web Attack and Defense Trends&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:30-12:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/e/e4/WongOnnChee_Biodata.pdf Wong Onn Chee], [http://www.owasp.org/index.php/Singapore, OWASP Singapore Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Outbound Monitoring of Web Servers: a Forgotten Child in Information Security?&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese/English&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:00-13:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:30-14:10 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Mark Goudie, Verizon Business&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | 2010 Data Breach Investigation Report&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:20-15:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/index.php/User:Pravir_Chandra, Pravir Chandra], OWASP&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [http://www.owasp.org/index.php/SAMM, OWASP OpenSAMM Project]&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | English with real-time Chinese translation&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:10-15:40 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [http://www.owasp.org/images/8/81/BioGaoWenInfoSec.pdf, Helen Gao], [http://www.owasp.org/index.php/Long_Island OWASP Long Island Chapter]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | OWASP and OWASP Projects&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:00-17:00 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Panel&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 40%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Round Table: Web App Security - State of Art&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(92, 121, 187);&amp;quot; | Chinese&lt;br /&gt;
|}&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
----&lt;br /&gt;
=== Diamond Sponsors: ===&lt;br /&gt;
[http://www.dbappsecurity.com.cn/ http://www.owasp.org/images/2/27/Dbappsecurity_logo.gif] 安恒信息&lt;br /&gt;
 &lt;br /&gt;
[http://www.armorize.com https://www.owasp.org/images/9/98/Armorize.png] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Platinum Sponsors: ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Gold Sponsors: ===&lt;br /&gt;
[http://www.venustech.com.cn/ http://www.owasp.org/images/4/4d/VenusTech_logo.gif]&lt;br /&gt;
----&lt;br /&gt;
=== Supporting Sponsors: ===&lt;br /&gt;
[http://www.huawei.com/ http://www.owasp.org/images/f/ff/Huawei_Logo.gif] &lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
{{MemberLinks|link=http://www.microsoft.com|logo=Logo_microsoft.jpg}}微软中国   &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[http://www.vulnhunt.com/ '''南京翰海源''']   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Educational Sponsors: ===&lt;br /&gt;
[http://www.is.cas.cn/ http://www.owasp.org/images/1/15/ISCAS_logo.gif]中国科学院软件研究所&lt;br /&gt;
 &lt;br /&gt;
[http://www.infosec.pku.edu.cn/ http://www.owasp.org/images/2/21/InfoSec_Lab_PKU_logo.gif] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Organizing Partners: ===&lt;br /&gt;
[http://www.idcquan.com/  http://www.idcquan.com/images/logo2009.gif]&lt;br /&gt;
&lt;br /&gt;
[http://www.seczone.org http://www.seczone.org/templates/jsn_epic_pro/images/logo.png]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Media Partners: ===&lt;br /&gt;
OWASP media resources and China mainstream IT Medias publicize this web application security summit in every rolling stage. Participated Medias include: &lt;br /&gt;
* Print Media：CIW, CNW, 365master, TTM, CCW, CISMAG, CBINEWS, etc&lt;br /&gt;
* Network Media: IT168, 51CTO, Chinabyte, CTOCIO, Sina.com, 163.com, QQ.com, etc.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Sponsor US! ===&lt;br /&gt;
We are still soliciting sponsors for the OWASP China Summit. An exhibit hall will be held for vendor booths and presentations. For more details, please see the OWASP China Summit 2010 Investment Guide [[http://www.owasp.org/images/d/df/OWASP_China_Summit_2010_Investment_Guide.doc English]][[http://www.owasp.org/images/5/53/OWASP_China_Summit_2010_Investment_Guide_Chinese.doc Chinese]]&lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team] to sponsor today!&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Conference Committee ====&lt;br /&gt;
&lt;br /&gt;
===Contact===&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team]&lt;br /&gt;
&lt;br /&gt;
===Organizers===&lt;br /&gt;
* Local host: &lt;br /&gt;
**[mailto:rip@owasp.org Rip Torn] [http://www.owasp.org/index.php/China-Mainland OWASP China-Mainland Chapter]&lt;br /&gt;
* Overseas: &lt;br /&gt;
** [mailto:weilin.zhong@owasp.org Weilin Zhong]&lt;br /&gt;
** [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
===Conference Committee===&lt;br /&gt;
* [mailto:rip@owasp.org Rip Torn] 万振华，Chair of OWASP China Mainland chapter&lt;br /&gt;
* [mailto:frank.fan@dbappsecurity.com.cn Frank Fan] 范渊，Vice President of OWASP China Mainland chapter, President of DBAPPSecurity Ltd.&lt;br /&gt;
* [mailto:weilin.zhong@owasp.org Weilin Zhong] 钟卫林，Lead of OWASP Chinese Project and Honeycomb Project, Senior Info Sec Eng at Wells Fargo, CISSP&lt;br /&gt;
* [mailto:heleng@owasp.org Helen Gao] 高雯，Lead of OWASP Long Island Chapter and OWASP Chinese Project, CISSP&lt;br /&gt;
* [mailto:ggfish@gmail.com Zhendong Yu] 于振东， OWASP Chinese Project, co-founder of Innovative Query Inc, CISSP &lt;br /&gt;
* [mailto:eric@owasp.org.cn Eric Chio] 趙嘉言, Lead of OWASP Shanghai Chapter, Microsoft.&lt;br /&gt;
* [mailto:nsace2009@gmail.com Jianchun Jiang] 蒋建春  - Lead of OWASP Beijing Chapter, Associate Professor, The Software Institute, Chinese Academy of Sciences, 中科院软件所副研究员. NSACE 负责人&lt;br /&gt;
* [mailto:wangjie8578@yahoo.com.cn Jie Wang]  王颉 - High Speed Network Group, Dept of Electronic and Electrical Engineering, Loughborough Univ.,UK.&lt;br /&gt;
* [mailto:wayne@armorize.com Wayne Huang] 黃耀文 - OWASP conference committee, OWASP Taiwan Chapter Chair, Founder and CEO of Armorize Technology.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
=== Volunteers Needed!  ===&lt;br /&gt;
&lt;br /&gt;
Get involved! We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
E-mail the [mailto:weilin.zhong@owasp.org OWASP China Summit 2010 Organization Team].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Logistics====&lt;br /&gt;
&lt;br /&gt;
=== Venue  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing Conference Center&lt;br /&gt;
&lt;br /&gt;
=== Hotel  ===&lt;br /&gt;
&lt;br /&gt;
Hotel Nikko New Century Beijing&lt;br /&gt;
北京新世纪日航酒店 北京市海淀区首体南路6号&lt;br /&gt;
&lt;br /&gt;
* Add: No.6 Southern Road, Capital Gym, Haidian District, Beijing 100044 &lt;br /&gt;
* Tel: 86-10-6849 2001 &lt;br /&gt;
* Fax: 86-10-6849 1103 &lt;br /&gt;
* http://www.newcenturyhotel.com.cn&lt;br /&gt;
&lt;br /&gt;
[http://www.newcenturyhotel.com.cn http://www.owasp.org.cn/images/stories/hotel.jpg]&lt;br /&gt;
&lt;br /&gt;
=== Travel  ===&lt;br /&gt;
&lt;br /&gt;
How to obtain a visa for the event&lt;br /&gt;
* Invitation letter will be sent out for overseas attendees after registration.&lt;br /&gt;
* For detailed information on obtaining a business visa for this event, please refer to [http://www.china-embassy.org/eng/hzqz/zgqz/t84247.htm Chinese embassy]&lt;br /&gt;
* More questions, please contact [mailto:heleng@owasp.org Helen Gao]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]][[Category:OWASP_China_Summit_2010]][[Category:China]]&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BioGaoWenInfoSec.pdf&amp;diff=91013</id>
		<title>File:BioGaoWenInfoSec.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BioGaoWenInfoSec.pdf&amp;diff=91013"/>
				<updated>2010-10-07T20:04:08Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91010</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91010"/>
				<updated>2010-10-07T19:57:35Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深应用安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究中心做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91008</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91008"/>
				<updated>2010-10-07T19:52:48Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has rich R&amp;amp;D experience in various information security areas, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91007</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91007"/>
				<updated>2010-10-07T19:46:39Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 资深安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has researched various information security topics, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深应用安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91006</id>
		<title>User:Weilin Zhong</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Weilin_Zhong&amp;diff=91006"/>
				<updated>2010-10-07T19:44:13Z</updated>
		
		<summary type="html">&lt;p&gt;Weilin Zhong: /* 美国富国银行资深安全专家 钟卫林 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Application Security Expert==&lt;br /&gt;
&lt;br /&gt;
Weilin is an application security expert with 13+ year's experience in information security and specializes in application security since 2002. She is an expert in security code review, penetration testing, vulnerability management, risk assessment and security process. Weilin has rich experience in application security consulting, helping organizations understand and mitigate their application security risks.&lt;br /&gt;
&lt;br /&gt;
Weilin currently works in the security code review team at the Wells Fargo bank, serving business channels across the entire enterprise on application security risks and security coding issues. Prior to Wells Fargo, Weilin spent 6+ years working as a security consultant in Aspect Security and Cigital, providing application security services to customers across various industrial verticals. &lt;br /&gt;
&lt;br /&gt;
Prior to her industrial experience, Weilin has spent 5 years in the academia as a research assistant in the Computer Science Department of University of Virginia and the Engineering Research Center of Information Security Technology (ERCIST) in Institute of Software, Chinese Academy of Sciences in Beijing China. She has researched various information security topics, including authentication, cryptography and network security.  &lt;br /&gt;
&lt;br /&gt;
Sharing the passion of application security, Weilin has been actively involved with OWASP since its early years. She is the creator of the OWASP Honeycomb Project, the lead of the OWASP Top 10 Chinese translation, the lead of the OWASP Chinese Project, the key organizer of [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010], and an active contributor for [http://www.owasp.org/index.php/China-Mainland OWASP China-mainland Chapter]. &lt;br /&gt;
&lt;br /&gt;
Weilin received her M.S. in Computer Science from University of Virginia and M.S. in Computer Software from Institute of Software, Chinese Academy of Sciences in Beijing China. Weilin received her B.S. from Huazhong University of Science and Technology in Wuhan China. Weilin has been a Certified Information Systems Security Professional (CISSP) since 2003 and holds GIAC Secure Software Programmer (GSSP) – Java certification.  &lt;br /&gt;
&lt;br /&gt;
Weilin is a mother of two wonderful young boys and lives with her family in Columbia Maryland. &lt;br /&gt;
&lt;br /&gt;
[mailto:weilin.zhong@owasp.org Email Weilin.]&lt;br /&gt;
&lt;br /&gt;
==资深安全专家 钟卫林==&lt;br /&gt;
&lt;br /&gt;
应用程序安全专家，13 年以上丰富的信息安全经验。精通互联网应用程序的代码检测，入侵检测，漏洞分析和风险评估的工具和方法，并随时跟踪最新的互联网和安全技术发展动向。现任职于美国第四大银行富国银行安全部门，为富国银行各个部门的各种大型企业级互联网应用程序提供代码安全服务，执行代码检测，漏洞分析和风险评估。钟卫林有多年安全咨询经验，曾任职美国领先的应用安全咨询公司Apsect Secuirty 和 Cigital, 为各个行业的各大公司提供各种安全咨询服务，帮助企业正确理解应用安全风险，建立和评估企业安全流程，为各种大型企业级应用程序提供安全评估和安全解决方案。钟卫林还拥有多年信息安全研究和开发经验，曾在美国弗吉尼亚大学的计算机系和中科院软件所信息安全工程研究做多个信息安全领域的研究和开发工作，包括身份认证系统，密码学和网络安全。钟卫林拥有美国弗吉尼亚大学计算机科学硕士学位，中国科学院软件所计算机软件硕士学位和华中理工大学计算机科学学士学位。钟卫林拥有CISSP和GSSP-J证书。&lt;/div&gt;</summary>
		<author><name>Weilin Zhong</name></author>	</entry>

	</feed>