<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wickett</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Wickett"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Wickett"/>
		<updated>2026-05-05T04:34:52Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2013&amp;diff=156222</id>
		<title>Lonestar Application Security Conference 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2013&amp;diff=156222"/>
				<updated>2013-07-29T20:22:00Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON-postcard-small.jpg|800px]]&lt;br /&gt;
&lt;br /&gt;
===== [http://lascon.org LASCON 2013] is happening on October 22-25th, 2013 in Austin, TX =====&lt;br /&gt;
Please see the Official Website http://lascon.org for all details&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Welcome  =&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend [http://lascon.org LASCON 2013]:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[https://www.cvent.com/events/lascon-2013/registration-44aa22326b4e44c587b71879f71b7d11.aspx https://www.owasp.org/images/c/c5/LASCON_Register_Now.gif]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[http://twitter.com/LASCONATX #LASCONATX]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([http://twitter.com/LASCONATX follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Registration  =&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
[https://www.cvent.com/events/lascon-2013/registration-44aa22326b4e44c587b71879f71b7d11.aspx https://www.owasp.org/images/c/c5/LASCON_Register_Now.gif]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend [http://lascon.org LASCON 2013]:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
= Training =&lt;br /&gt;
&lt;br /&gt;
See Official LASCON website http://lascon.org/&lt;br /&gt;
&lt;br /&gt;
= Sessions  =&lt;br /&gt;
&lt;br /&gt;
See Official LASCON website http://lascon.org/&lt;br /&gt;
&lt;br /&gt;
= Volunteers  =&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact paul.griffiths(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Sponsors  =&lt;br /&gt;
&lt;br /&gt;
Please visit the [http://lascon.org/sponsorship/ Sponsorship] page for information on sponsoring [http://lascon.org/ LASCON 2013]&lt;br /&gt;
&lt;br /&gt;
= Venue  =&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
[http://lascon.org/ LASCON 2013] will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Travel  =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Hotel  ==&lt;br /&gt;
&lt;br /&gt;
The Hotel Allandale is located next to the Norris Conference Center.  You can call the hotel directly for reservations.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Hotel Allandale&amp;lt;br&amp;gt;&lt;br /&gt;
7685 Northcross Drive, Austin, TX 78757&amp;lt;br&amp;gt;&lt;br /&gt;
Reservations line, 1-800-851-9111&amp;lt;br&amp;gt;&lt;br /&gt;
Front Desk, 512-452-9391&amp;lt;br&amp;gt;&lt;br /&gt;
http://hotelallandale.com&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Rooms include a full breakfast daily and a social hour Monday-Thursday.  Hotel Allandale is walking distance from the Norris Conference Center!&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:Allandale.png|400px]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Click for historic information on [http://www.owasp.org/index.php/AppSecUSA_2012 AppSecUSA 2012, LASCON Edition],  [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2011 LASCON 2011], [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:LASCON-postcard-small.jpg&amp;diff=156221</id>
		<title>File:LASCON-postcard-small.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:LASCON-postcard-small.jpg&amp;diff=156221"/>
				<updated>2013-07-29T20:21:11Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ruby_on_Rails_Cheatsheet&amp;diff=144503</id>
		<title>Ruby on Rails Cheatsheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ruby_on_Rails_Cheatsheet&amp;diff=144503"/>
				<updated>2013-02-15T15:31:13Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;DRAFT CHEAT SHEET - WORK IN PROGRESS&lt;br /&gt;
&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
This article intends to provide quick basic Ruby on Rails security tips for developers. The Rails framework abstracts developers from quite a bit of tedious work and provides the means to accomplish complex tasks quickly and with ease. New developers, those unfamiliar with the inner-workings of Rails, likely need a basic set of guidelines to secure fundamental aspects of their application. The intended purpose of this doc is to be that guide.&lt;br /&gt;
&lt;br /&gt;
= Items =&lt;br /&gt;
== Command Injection == &lt;br /&gt;
&lt;br /&gt;
Ruby offers a function called “eval” which will dynamically build new Ruby code based on Strings.  It also has a number of ways to call system commands.&lt;br /&gt;
 &lt;br /&gt;
   eval(&amp;quot;ruby code here&amp;quot;)&lt;br /&gt;
   System(&amp;quot;os command here&amp;quot;)&lt;br /&gt;
   `ls -al /`   (backticks contain os command)&lt;br /&gt;
   Kernel.exec(&amp;quot;os command here&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
While the power of these commands is quite useful, extreme care should be taken when using them in a Rails based application.  Usually, its just a bad idea.  If need be, a whitelist of possible values should be used and any input should be validated as thoroughly as possible.&lt;br /&gt;
&lt;br /&gt;
== SQL Injection == &lt;br /&gt;
&lt;br /&gt;
Ruby on Rails is often used with an ORM called ActiveRecord, though it is flexible and can be used with other data sources.  Typically very simple Rails applications use methods on the Rails models to query data.  Many use cases protect for SQL Injection out of the box.  However, it is possible to write code that allows for SQL Injection.  &lt;br /&gt;
&lt;br /&gt;
Here is an example (Rails 2.X style):&lt;br /&gt;
&lt;br /&gt;
    @projects = Project.find(:all, :conditions =&amp;gt; “name like #{params[:name]}”)&lt;br /&gt;
&lt;br /&gt;
A Rails 3.X example:&lt;br /&gt;
&lt;br /&gt;
    name = params[:name]&lt;br /&gt;
    @projects = Project.where(“name like ‘“ + name + “‘“);&lt;br /&gt;
&lt;br /&gt;
In both of these cases, the statement is injectable because the name parameter is not escaped.  &lt;br /&gt;
&lt;br /&gt;
Here is the idiom for building this kind of statement:&lt;br /&gt;
&lt;br /&gt;
    @projects = Project.find(:all, :conditions =&amp;gt; [ “name like ?”, “#{params[:name]}”] )&lt;br /&gt;
&lt;br /&gt;
An AREL based solution:&lt;br /&gt;
&lt;br /&gt;
    @projects = Project.where(&amp;quot;name like ?&amp;quot;, &amp;quot;%#{params[:name]}%&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Use caution not to build SQL statements based on user controlled input.  A list of more realistic and detailed examples is here: [http://rails-sqli.org rails-sqli.org].&lt;br /&gt;
&lt;br /&gt;
== Cross-site Scripting (XSS) == &lt;br /&gt;
&lt;br /&gt;
By default, in Rails 3.0 protection against XSS comes as the default behavior.  When string data is shown in views, it is escaped prior to being sent back to the browser.  This goes a long way, but there are common cases where developers bypass this protection - for example to enable rich text editing.  In the event that you want to pass variables to the front end with tags intact, it is tempting to do the following in your .erb file (ruby markup).&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;%= raw @product.name %&amp;gt;   &lt;br /&gt;
    &amp;lt;%= @product.name.html_safe %&amp;gt;       These are examples of how NOT to do it!&lt;br /&gt;
    &amp;lt;%= content_tag @product.name %&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Unfortunately, any field that uses raw like this will be a potential XSS target.  Note that there are also widespread misunderstandings about html_safe.  [http://stackoverflow.com/questions/4251284/raw-vs-html-safe-vs-h-to-unescape-html This writeup] describes the underlying SafeBuffer mechanism in detail.  Other tags that change the way strings are prepared for output can introduce similar issues, including content_tag.&lt;br /&gt;
&lt;br /&gt;
One way to manage cases like this is to use a Rails provided helper method called sanitize:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;%= sanitize @project.name, :tags =&amp;gt; %w(h1 h2 h3 h4 h5), :attributes =&amp;gt; %() %&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This eliminates tags other than &amp;lt;nowiki&amp;gt;&amp;lt;h1&amp;gt;, &amp;lt;h2&amp;gt;, &amp;lt;h3&amp;gt;, &amp;lt;h4&amp;gt;, &amp;lt;h5&amp;gt;&amp;lt;/nowiki&amp;gt;.  It also disallows attributes on those tags.  Note that it is critical to understand the tags you enable here.  &amp;lt;nowiki&amp;gt;&amp;lt;img&amp;gt;&amp;lt;/nowiki&amp;gt; may seem like an innocuous tag, but through various attributes on &amp;lt;nowiki&amp;gt;&amp;lt;img/&amp;gt;&amp;lt;/nowiki&amp;gt; that are scriptable such as onError=””.  Only by sanitizing only innocuous tags can XSS be prevented.&lt;br /&gt;
&lt;br /&gt;
A more attractive alternative to using sanitize and real HTML content is to use an alternative markup language for rich text in an application (Examples include:  markdown and textile) and disallow HTML tags. This ensures that the input accepted doesn’t include HTML content that could be malicious.&lt;br /&gt;
&lt;br /&gt;
An often overlooked XSS attack vector is the href value of a link:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;%= link_to “Personal Website”, @user.website %&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If @user.website contains a link that starts with “javascript:”, the content will execute when a user clicks the generated link:&lt;br /&gt;
&lt;br /&gt;
    &amp;lt;a href=”javascript:alert(‘Haxored’)”&amp;gt;Personal Website&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sessions ==&lt;br /&gt;
&lt;br /&gt;
By default, Ruby on Rails uses a Cookie based session store.  What that means is that unless you change something, the session will not expire on the server.  That means that some default applications may be vulnerable to replay attacks.  It also means that sensitive information should never be put in the session.&lt;br /&gt;
&lt;br /&gt;
The best practice is to use a database based session, which thankfully is very easy with Rails:&lt;br /&gt;
&lt;br /&gt;
    Project::Application.config.session_store :active_record_store&lt;br /&gt;
&lt;br /&gt;
== Authentication == &lt;br /&gt;
&lt;br /&gt;
Generally speaking, Rails does not provide authentication by itself.  However, most developers using Rails leverage libraries such as Devise or AuthLogic to provide authentication.  To enable authentication with Devise, one simply has to put the following in a controller:&lt;br /&gt;
&lt;br /&gt;
    class ProjectController &amp;lt; ApplicationController&lt;br /&gt;
        before_filter :authenticate_user&lt;br /&gt;
&lt;br /&gt;
As with other methods, this supports exceptions.  Note that by default Devise only requires 6 characters for a password.  The minimum can be changed in:  /config/initializers/devise.rb&lt;br /&gt;
&lt;br /&gt;
    config.password_length = 8..128&lt;br /&gt;
&lt;br /&gt;
There are several possible ways to enforce complexity.  One is to put a Validator in the user model.&lt;br /&gt;
      &lt;br /&gt;
    validate :password_complexity&lt;br /&gt;
    def password_complexity&lt;br /&gt;
       if password.present? and not password.match(/\A(?=.*[a-z])(?=.*[A-Z])(?=.*\d).+\z/)&lt;br /&gt;
           errors.add :password, &amp;quot;must include at least one lowercase letter, one uppercase letter, and one digit&amp;quot;&lt;br /&gt;
       end&lt;br /&gt;
    end&lt;br /&gt;
&lt;br /&gt;
== Insecure Direct Object Reference or Forceful Browsing == &lt;br /&gt;
&lt;br /&gt;
By default, Ruby on Rails apps use a RESTful uri structure.  That means that paths are often intuitive and guessable.  To protect against a user trying to access or modify data that belongs to another user, it is important to specifically control actions.  Out of the gate on a vanilla Rails application, there is no such built in protection.  It is possible to do this by hand at the controller level.  &lt;br /&gt;
&lt;br /&gt;
It is also possible, and probably recommended, to consider resource-based access control libraries such as [https://github.com/ryanb/cancan cancan] to do this. This ensures that all operations on a database object are authorized by the business logic of the application.&lt;br /&gt;
&lt;br /&gt;
== CSRF (Cross Site Request Forgery) ==&lt;br /&gt;
&lt;br /&gt;
Ruby on Rails has specific, built in support for CSRF tokens.  To enable it, or ensure that it is enabled, find the base ApplicationController and look for a directive such as the following:&lt;br /&gt;
&lt;br /&gt;
    class ApplicationController &amp;lt; ActionController::Base&lt;br /&gt;
        protect_from_forgery&lt;br /&gt;
&lt;br /&gt;
Note that the syntax for this type of control includes a way to add exceptions.  Exceptions may be useful for API’s or other reasons - but should be reviewed and consciously included.  In the example below, the Rails ProjectController will not provide CSRF protection for the show method.&lt;br /&gt;
&lt;br /&gt;
   class ProjectController &amp;lt; ApplicationController&lt;br /&gt;
       protect_from_forgery :except =&amp;gt; :show&lt;br /&gt;
&lt;br /&gt;
Also note that by default Rails does not provide CSRF protection for any HTTP GET request.&lt;br /&gt;
&lt;br /&gt;
== Mass Assignment and Strong Parameters == &lt;br /&gt;
&lt;br /&gt;
Although the major issue with Mass Assignment has been fixed by default in base Rails specifically when generating new projects, it still applies to older and upgraded projects so it is important to understand the issue and to ensure that only attributes that are intended to be modifiable are exposed.&lt;br /&gt;
&lt;br /&gt;
When working with a model, the attributes on the model will not be accessible to forms being posted unless a programmer explicitly indicates that:&lt;br /&gt;
&lt;br /&gt;
    class Project &amp;lt; ActiveRecord::Base&lt;br /&gt;
        attr_accessible :name, :admin&lt;br /&gt;
    end&lt;br /&gt;
&lt;br /&gt;
With the admin attribute accessible based on the example above, the following could work:&lt;br /&gt;
&lt;br /&gt;
    curl -d “project[name]=triage&amp;amp;project[admin]=1” host:port/projects&lt;br /&gt;
&lt;br /&gt;
Review accessible attributes to ensure that they should be accessible.  If you are working in Rails &amp;lt; 3.2.3 you should ensure that your attributes are whitelisted with the following:&lt;br /&gt;
&lt;br /&gt;
    config.active_record.whitelist_attributes = true&lt;br /&gt;
&lt;br /&gt;
In Rails 4.0 strong parameters will be the recommended approach for handling attribute visibility. It is also possible to use the strong_parameters gem with Rails 3.x, and the strong_parameters_rails2 gem for Rails 2.3.x applications.&lt;br /&gt;
&lt;br /&gt;
== Redirects and Forwards == &lt;br /&gt;
&lt;br /&gt;
Web applications often require the ability to dynamically redirect users based on client-supplied data. To clarify, dynamic redirection usually entails the client including a URL in a parameter within a request to the application. Once received by the application, the user is redirected to the URL specified in the request. For example:&lt;br /&gt;
&lt;br /&gt;
http://www.example.com/redirect?url=http://www.example_commerce_site.com/checkout&lt;br /&gt;
&lt;br /&gt;
The above request would redirect the user to http://www.example.com/checkout.  The security concern associated with this functionality is leveraging an organization’s trusted brand to phish users and trick them into visiting a malicious site, in our example, “badhacker.com”.  Example:&lt;br /&gt;
&lt;br /&gt;
http://www.example.com/redirect?url=http://badhacker.com&lt;br /&gt;
&lt;br /&gt;
The obvious fix for this type of vulnerability is to restrict to specific Top-Level Domains (TLDs), statically define specific sites, or map a key to it’s value. Example:&lt;br /&gt;
&lt;br /&gt;
    ACCEPTABLE_URLS = {&lt;br /&gt;
        ‘our_app_1’ =&amp;gt; “https://www.example_commerce_site.com/checkout”,&lt;br /&gt;
        ‘our_app_2’ =&amp;gt; “https://www.example_user_site.com/change_settings”&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
http://www.example.com/redirect?url=our_app_1&lt;br /&gt;
&lt;br /&gt;
   def redirect&lt;br /&gt;
       url = ACCEPTABLE_URLS[“#{params[:url]}”]&lt;br /&gt;
       redirect_to url if url&lt;br /&gt;
   end&lt;br /&gt;
&lt;br /&gt;
If matching user input against a list of approved sites or TLDs against regular expression is a must, it makes sense to leverage a library such as URI.parse() to obtain the host and then take the host value and match it against regular expression patterns. Those regular expressions must, at a minimum, have anchors or there is a greater chance of an attacker bypassing the validation routine.&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
    require ‘uri’&lt;br /&gt;
    host = URI.parse(“#{params[:url]}”).host&lt;br /&gt;
    validation_routine(host) if host&lt;br /&gt;
    def validation_routine(host)&lt;br /&gt;
        # Validation routine where we use  \A and \z as anchors *not* ^ and $&lt;br /&gt;
    end&lt;br /&gt;
&lt;br /&gt;
== Dynamic Render Paths == &lt;br /&gt;
&lt;br /&gt;
In Rails, controller actions and views can dynamically determine which view or partial to render by calling the “render” method. If user input is used in or for the template name, an attacker could cause the application to render an arbitrary view, such as an administrative page.&lt;br /&gt;
&lt;br /&gt;
Care should be taken when using user input to determine which view to render. If possible, avoid any user input in the name or path to the view.&lt;br /&gt;
&lt;br /&gt;
== Cross Origin Resource Sharing ==&lt;br /&gt;
&lt;br /&gt;
Occasionally, a need arises to share resources with another domain. For example, a file-upload function that sends data via an AJAX request to another domain. In these cases, the same-origin rules followed by web browsers must be bent. Modern browsers, in compliance with HTML5 standards, will allow this to occur but in order to do this; a couple precautions must be taken.&lt;br /&gt;
&lt;br /&gt;
When using a nonstandard HTTP construct, such as an atypical Content-Type header, for example, the following applies:&lt;br /&gt;
&lt;br /&gt;
The receiving site should whitelist only those domains allowed to make such requests as well as set the Access-Control-Allow-Origin header in both the response to the OPTIONS request and POST request. This is because the OPTIONS request is sent first, in order to determine if the remote or receiving site allows the requesting domain. Next, a second request, a POST request, is sent. Once again, the header must be set in order for the transaction to be shown as successful.&lt;br /&gt;
&lt;br /&gt;
When standard HTTP constructs are used:&lt;br /&gt;
&lt;br /&gt;
The request is sent and the browser, upon receiving a response, inspects the response headers in order to determine if the response can and should be processed.&lt;br /&gt;
&lt;br /&gt;
Note: Do NOT do use the wildcard in the access control header as it allows communication with any site.&lt;br /&gt;
    Access-Control-Allow-Origin: *       (Bad example)&lt;br /&gt;
&lt;br /&gt;
Whitelist in Rails:&lt;br /&gt;
&lt;br /&gt;
Gemfile&lt;br /&gt;
    gem 'rack-cors', :require =&amp;gt; 'rack/cors'&lt;br /&gt;
&lt;br /&gt;
config/application.rb&lt;br /&gt;
    module Sample&lt;br /&gt;
        class Application &amp;lt; Rails::Application&lt;br /&gt;
            config.middleware.use Rack::Cors do&lt;br /&gt;
                allow do&lt;br /&gt;
                    origins 'someserver.example.com'&lt;br /&gt;
                    resource %r{/users/\d+.json},&lt;br /&gt;
                        :headers =&amp;gt; ['Origin', 'Accept', 'Content-Type'],&lt;br /&gt;
                        :methods =&amp;gt; [:post, :get]&lt;br /&gt;
                end&lt;br /&gt;
            end&lt;br /&gt;
        end&lt;br /&gt;
    end&lt;br /&gt;
&lt;br /&gt;
== Security-related headers ==&lt;br /&gt;
&lt;br /&gt;
To set a header value, simply access the response.headers object as a hash inside your controller (often in a before/after_filter).&lt;br /&gt;
&lt;br /&gt;
  response.headers['X-header-name'] = 'value'&lt;br /&gt;
&lt;br /&gt;
'''Rails 4''' provides the &amp;quot;default_headers&amp;quot; functionality that will automatically apply the values supplied. This works for most headers in almost all cases.  Note: this does not account for content security policy.&lt;br /&gt;
&lt;br /&gt;
  ActionDispatch::Response.default_headers = {	  	&lt;br /&gt;
    'X-Frame-Options' =&amp;gt; 'DENY', 	&lt;br /&gt;
    'X-Content-Type-Options' =&amp;gt; 'nosniff',	  	&lt;br /&gt;
    'X-XSS-Protection' =&amp;gt; '1;'&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
Strict transport security is a special case, it is set in an environment file (e.g. production.rb)&lt;br /&gt;
&lt;br /&gt;
  config.force_ssl = true&lt;br /&gt;
&lt;br /&gt;
For those not on the edge, there is a library ([https://github.com/twitter/secureheaders secure_headers]) for the same behavior with content security policy abstraction provided. It will automatically apply logic based on the user agent to produce a concise set of headers.&lt;br /&gt;
&lt;br /&gt;
== Business Logic Bugs ==&lt;br /&gt;
&lt;br /&gt;
Any application in any technology can contain business logic errors that result in security bugs.  Business logic bugs are difficult to impossible to detect using automated tools.  The best ways to prevent business logic security bugs are to do code review, pair program and write unit tests.&lt;br /&gt;
&lt;br /&gt;
== Attack Surface == &lt;br /&gt;
&lt;br /&gt;
Generally speaking, Rails avoids open redirect and path traversal types of vulnerabilities because of its /config/routes.rb file which dictates what URL’s should be accessible and handled by which controllers.  The routes file is a great place to look when thinking about the scope of the attack surface.  An example might be as follows:&lt;br /&gt;
&lt;br /&gt;
    match ':controller(/:action(/:id(.:format)))' # this is an example of what NOT to do&lt;br /&gt;
&lt;br /&gt;
In this case, this route allows any public method on any controller to be called as an action.  As a developer, you want to make sure that users can only reach the controller methods intended and in the way intended.&lt;br /&gt;
&lt;br /&gt;
== Sensitive Files == &lt;br /&gt;
&lt;br /&gt;
Many Ruby on Rails apps are open source and hosted on publicly available source code repositories.  Whether that is the case or the code is committed to a corporate source control system, there are certain files that should be either excluded or carefully managed.&lt;br /&gt;
&lt;br /&gt;
    /config/database.yml                 -  May contain production credentials.&lt;br /&gt;
    /config/initializers/secret_token.rb -  Contains a secret used to hash session cookie.&lt;br /&gt;
    /db/seeds.rb                         -  May contain seed data including bootstrap admin user.&lt;br /&gt;
    /db/development.sqlite3              -  May contain real data. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Encryption == &lt;br /&gt;
&lt;br /&gt;
Rails uses OS encryption.  Generally speaking, it is always a bad idea to write your own encryption.&lt;br /&gt;
&lt;br /&gt;
Devise by default uses bcrypt for password hashing, which is an appropriate solution.  Typically, the following config causes the 10 stretches for production:  /config/initializers/devise.rb&lt;br /&gt;
&lt;br /&gt;
    config.stretches = Rails.env.test? ? 1 : 10&lt;br /&gt;
&lt;br /&gt;
= Updating Rails and Having a Process for Updating Dependencies = &lt;br /&gt;
&lt;br /&gt;
In early 2013, a number of critical vulnerabilities were identified in the Rails Framework.  Organizations that had fallen behind current versions had more trouble updating and harder decisions along the way, including patching the source code for the framework itself.&lt;br /&gt;
&lt;br /&gt;
An additional concern with Ruby applications in general is that most libraries (gems) are not signed by their authors.  It is literally impossible to build a Rails based project with libraries that come from trusted sources.  One good practice might be to audit the gems you are using.&lt;br /&gt;
&lt;br /&gt;
In general, it is important to have a process for updating dependencies.  An example process might define three mechanisms for triggering an update of response: &lt;br /&gt;
* Every month/quarter dependencies in general are updated.&lt;br /&gt;
* Every week important security vulnerabilities are taken into account and potentially trigger an update.&lt;br /&gt;
* In EXCEPTIONAL conditions, emergency updates may need to be applied.&lt;br /&gt;
&lt;br /&gt;
= Tools =&lt;br /&gt;
&lt;br /&gt;
Use [http://brakemanscanner.org/ brakeman], an open source code analysis tool for Rails applications, to identify many potential issues.  It will not necessarily produce comprehensive security findings, but it can find easily exposed issues.  A great way to see potential issues in Rails is to review the brakeman documentation of warning types.&lt;br /&gt;
&lt;br /&gt;
There are emerging tools that can be used to track security issues in dependency sets, like [http://sourceninja.com SourceNinja].&lt;br /&gt;
&lt;br /&gt;
Another area of tooling is the security testing tool [http://gauntlt.org Gauntlt] which is built on cucumber and uses gherkin syntax to define attack files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors = &lt;br /&gt;
Matt Konda - mkonda [at] jemurai.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Matatall neil [at] matatall.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Ken Johnson cktricky [at] gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Justin Collins justin [at] presidentbeef.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jon Rose - jrose400 [at] gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Lance Vaughn - lance [at] cabforward.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jon Claudius - jonathan.claudius [at] gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico jim [at] owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Aaron Bedra aaron [at] aaronbedra.com&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Related Articles and References = &lt;br /&gt;
&lt;br /&gt;
* [http://guides.rubyonrails.org/security.html The Official Rails Security Guide]&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Ruby_on_Rails_Security_Guide_V2 OWASP Ruby on Rails Security Guide]&lt;br /&gt;
* [http://code.google.com/p/ruby-security/wiki/Guide The Ruby Security Reviewers Guide]&lt;br /&gt;
* [https://groups.google.com/forum/?fromgroups#!forum/rubyonrails-security The Ruby on Rails Security Mailing List]&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140668</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140668"/>
				<updated>2012-12-04T18:00:07Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk, Mani Tadayon, James Wickett''' | Rugged devops | [http://www.slideshare.net/wickett/gauntlt-rugged-by-example Gauntlt Rugged By Example - Slideshare] &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140667</id>
		<title>AppSecUSA 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSecUSA_2012&amp;diff=140667"/>
				<updated>2012-12-04T17:59:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;AppSec USA 2012 — LASCON Edition, TX&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX at the Hyatt Regency Hotel Downtown&amp;lt;br&amp;gt;&lt;br /&gt;
Training: October 23rd-24th — Conference Sessions: October 25th-26th&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP AppSec conferences bring together industry, government, security researchers, and practitioners to discuss the state of the art in application security.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
For more information on CFP, CFT, Sponsorship, and registration, '''see the official AppSec USA website at [http://www.appsecusa.org http://www.appsecusa.org]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;AppSec USA 2012 Presentations and Talks&amp;lt;/span&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Thursday 25th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Thursday)	&amp;lt;/span&amp;gt;===&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements ==== &lt;br /&gt;
	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px; width:100%;&amp;quot; &amp;gt;'''John Benninghoff''' | Developer | [https://www.owasp.org/images/7/7f/Building_Predictable_Systems.pdf Building Predictable Systems using Behavioral Security Modeling - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Top Ten Web Defenses ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jim Manico''' | Mobile | [https://www.owasp.org/images/0/08/Top_10_Defenses_for_Website_Security.pdf Top 10 Defenses for Website Security - PDF] &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | &lt;br /&gt;
==== Mobile Applications &amp;amp; Proxy Shenanigans ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Amodio''' | Mobile | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alejandro Caceres''' | Reverse Engineering | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Gauntlt: Rugged by Example ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Shirk, Mani Tadayon, James Wickett''' | Rugged devops | [http://www.slideshare.net/wickett/gauntlt-rugged-by-example Gauntlt Rugged By Example - Slideshare &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am  - 11:45 am (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Building a Web Attacker Dashboard with ModSecurity and BeEF ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ryan Barnett''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sherif Koussa''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cracking the Code of Mobile Application ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Sreenarayan Ashokkumar''' | Mobile | [https://www.owasp.org/images/c/cd/Cracking_the_Mobile_Application_Code.pdf Cracking the Mobile Application Code - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking .NET Application: Reverse Engineering 101 ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jon Mccoy''' | Reverse Engineering | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman''' | Rugged devops | [https://www.owasp.org/images/d/d5/Doing_the_Unstuck.pdf Doing the unstuck: How Rugged cultures drive Biz &amp;amp; AppSec Value - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm  - 2:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hacking with WebSockets ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Vaagn Toukharian''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== Bug Bounty Programs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice''' | Developer | Presentation Not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== How we tear into that little green man ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mathew Rowley''' | Mobile | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jerry Hoff''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Put your robots to work: security automation at Twitter ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Justin Collins, Neil Matatall, Alex Smolen''' | Rugged devops | Presentation Not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm  - 3:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Exploiting Internal Network Vulns via the Browser using BeEF Bind ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Michele Orru''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application (OWASP ZAP extension) ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shay Chen''' | Developer | [https://www.owasp.org/images/f/f5/The_Diviner_-_Digital_Clairvoyance_Breakthrough_-_Gaining_Access_to_the_Source_Code_%26_Server_Side_Memory_Structure_of_ANY_Application.pdf Gaining Access to the Source Code &amp;amp; Server Side Memory Structure of ANY Application - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Demystifying Security in the Cloud: AWS Scout ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jonathan Chittenden''' | Cloud | [https://www.owasp.org/images/0/0f/Demystifying_Security_in_the_Cloud.pdf Demystifying Security in the Cloud - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== I&amp;gt;S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Ofer Maor''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Rebooting (secure) software development with continuous deployment ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Nick Galbreath''' | Rugged devops | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm  - 4:45 pm (Thursday)&amp;lt;/span&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Cross Site Port Scanning ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Riyaz Walikar''' | Attack | [https://www.owasp.org/images/8/89/Poking_Servers_with_Facebook-Cross_Site_Port_Scanning.pdf Cross Site Port Scanning - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Analyzing and Fixing Password Protection Schemes ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Steven''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Static Analysis of Java Class Files for Quickly and Accurately Detecting Web-Language Encoding Methods ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Arshan Dabirsiaghi, Alex Emsellem, Matthew Paisner''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== WTF - WAF Testing Framework ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yaniv Azaria, Amichai Shulman''' | Architecture | [https://www.owasp.org/images/0/00/OWASP-2012-WTF.pdf WAF Testing Framework - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== DevOps Distilled: The DevOps Panel at AppSec USA ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett''' | Rugged devops | [https://www.owasp.org/images/9/90/Corman_AppSecUSA_2012_DevOpsPanel.pdf DevOps Distilled - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== '''Friday 26th Oct''' ==&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;10:00 am - 10:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot; style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Effective approaches to web application security ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Zane Lackey''' | Developer | [https://www.owasp.org/images/b/b4/Effective_approaches_to_web_application_security.pdf Effective approaches to web application security - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Why Web Security Is Fundamentally Broken ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jeremiah Grossman''' | Developer | [https://www.owasp.org/images/9/90/Web_Security_Fundamentally_Broken.pdf Why Web Security Is Fundamentally Broken - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Payback on Web Attackers: Web Honeypots ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Simon Roses Femerling''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Spin the bottle: Coupling technology and SE for one awesome hack ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''David Kennedy''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Incident Response: Security After Compromise ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Richard Bejtlich''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;11:00 am - 11:45 am (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== The Same-Origin Saga ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brendan Eich''' | Developer | [https://www.owasp.org/images/a/a2/The_Same-Origin_Saga.pdf The Same-Origin Saga - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Hack your way to a degree: a new direction in teaching application security at universities ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Konstantinos Papapanagiotou''' | Developer | [https://www.owasp.org/images/9/9a/OWASP_Hackademic_AppSecUS2012_v1.pdf Hack your way to a degree - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Cornell, Josh Sokol''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Blended Threats and JavaScript: A Plan for Permanent Network Compromise ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phil Purviance''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==== Unbreakable Oracle ERPs? Attacks on Siebel &amp;amp; JD Edwards ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Juan Perez-Etchegoyen, Jordan Santarsieri''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;1:00 pm - 1:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Builders Vs. Breakers ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Brett Hardin, Matt Konda, Jon Rose''' | Developer | [https://www.owasp.org/images/8/83/OWASP_AppSec_2012-Builders-vs-Breakers.pdf Builders-vs-Breakers - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Real World Cloud Application Security ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jason Chan''' | Cloud | Presentation not available&amp;lt;/span&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== NoSQL, no security? ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Will Urbanski''' | Architecture | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== SQL Server Exploitation, Escalation, and Pilfering ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Antti Rantasaari, Scott Sutherland''' | Attack | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Iran's real life cyberwar ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Phillip Hallam-Baker''' | Case Studies | [https://www.owasp.org/images/5/59/Iran%E2%80%99s_Real_Life_Cyberwar.pdf Iran’s Real Life Cyberwar - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;2:00 pm - 2:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Get off your AMF and don’t REST on JSON ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dan Kuykendall''' | Developer | [https://www.owasp.org/images/2/20/Get_off_your_AMF_and_dont_REST_on_JSON-AppSecUSA2012.pdf Get off your AMF and don’t REST on JSON - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Unraveling Some of the Mysteries around DOM-Based XSS ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Dave Wichers''' | Developer | [https://www.owasp.org/images/c/c5/Unraveling_some_Mysteries_around_DOM-based_XSS.pdf Unraveling some Mysteries around DOM-based XSS - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Tobias Gondrom''' | Architecture | [https://www.owasp.org/images/f/fe/OWASP_defending-MITMA_US_2012.pdf Securing the SSL channel against man-in-the-middle attacks - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== XSS &amp;amp; CSRF with HTML5 - Attack, Exploit and Defense ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Shreeraj Shah''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== The Application Security Ponzi Scheme: Stop paying for security failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Jarret Raim, Matt Tesauro''' | Case Studies | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;3:00 pm - 3:45 pm (Friday)&amp;lt;/span&amp;gt;	===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Using Interactive Static Analysis for Early Detection of Software Vulnerabilities ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Bill Chu''' | Developer | [https://www.owasp.org/images/4/46/Interactive_Static_Analysis.pdfInteractive Static Analysis for Early Detection of Software Vulnerabilities - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Origin(al) Sins ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Alex Russell''' | Developer | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; | 	&lt;br /&gt;
==== The 7 Qualities of Highly Secure Software ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Mano 'dash4rk' Paul''' | Architecture | [https://www.owasp.org/index.php/File:7_Qualities_of_Highly_Secure_Software.pdf 7 Qualities of Highly Secure Software - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web Framework Vulnerabilities  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Abraham Kang''' | Attack | [https://www.owasp.org/images/d/db/WebFrameworkVulnerablilitiesAppSecUSA.pdf Web App Framework Based Vulnerabilies - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Web App Crypto - A Study in Failure ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Travis H''' | Case Studies | [https://www.owasp.org/images/2/2f/Web_app_crypto_20121026.pdf Web App Cryptology A Study in Failure - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;span style=&amp;quot;color:#006699;&amp;quot;&amp;gt;4:00 pm - 4:45 pm (Friday)&amp;lt;/span&amp;gt; === &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| cellpadding=&amp;quot;5&amp;quot; cellspacing=&amp;quot;0&amp;quot;  style=&amp;quot;background:#F2F5F7; border:1px solid #CCCCCC;&amp;quot; width=&amp;quot;100%&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Security at Scale ==== 	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Yvan Boily''' | Developer | Presentation not available&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Four Axes of Evil ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''HD Moore''' | Developer | [https://www.owasp.org/images/6/6f/Four_Axes_of_Evil.pdf Four Axes of Evil - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Pining For the Fjords: The Role of RBAC in Today's Applications ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Wendy Nather''' | Architecture | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |&lt;br /&gt;
==== Counterintelligence Attack Theory  ====&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''Fred Donovan''' | Attack | Presentation not available &amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;left&amp;quot; width=&amp;quot;100%&amp;quot; |	&lt;br /&gt;
==== Top Strategies to Capture Security Intelligence for Applications ====	&lt;br /&gt;
&amp;lt;span style=&amp;quot;background:#FFFFFF; border:1px solid #CCCCCC; padding:5px&amp;quot; &amp;gt;'''John Dickson''' | Case Studies | [https://www.owasp.org/images/8/8c/Top_Strategies_to_Capture_Security_Intelligence_for_Applications_OWASP.pdf Top Strategies to Capture Security Intelligence for Applications - PDF]&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133671</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133671"/>
				<updated>2012-07-31T13:56:51Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
* Doug Landoll&lt;br /&gt;
* Matt Malone&lt;br /&gt;
* David Hughes (@DavidHugh3s)&lt;br /&gt;
* The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol (@joshsokol)&lt;br /&gt;
* WAF evasion with SSL - David Lister&lt;br /&gt;
* Phil Beyer (@pjbeyer)&lt;br /&gt;
* #securityisms - The Real APT! - Brian Engle (@brainaengle)&lt;br /&gt;
* Re-integration: Don't fear closed systems - Michael Cote (@cote)&lt;br /&gt;
* Selling Security - Bill Kasper (aka The Hacker Vaccine) (@hackervaccine)&lt;br /&gt;
* Be mean to your code! - James Wickett (@wickett)&lt;br /&gt;
* Implementing Social Sign On(SSO+) in an Large Enterprise Single Sign On(SSO)  Ecosystem - Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133539</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133539"/>
				<updated>2012-07-26T17:05:52Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
* Karthik Gaekwad (@iteration1)&lt;br /&gt;
* David Hughes (@DavidHugh3s)&lt;br /&gt;
* The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol (@joshsokol)&lt;br /&gt;
* WAF evasion with SSL - David Lister&lt;br /&gt;
* Phil Beyer (@pjbeyer)&lt;br /&gt;
* #securityisms - The Real APT! - Brian Engle (@brainaengle)&lt;br /&gt;
* Re-integration: Don't fear closed systems - Michael Cote (@cote)&lt;br /&gt;
* Selling Security - Bill Kasper (aka The Hacker Vaccine) (@hackervaccine)&lt;br /&gt;
* Be mean to your code! - James Wickett (@wickett)&lt;br /&gt;
* Implementing Social Sign On(SSO+) in an Large Enterprise Single Sign On(SSO)  Ecosystem - Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133530</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133530"/>
				<updated>2012-07-26T14:34:16Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
* Karthik Gaekwad (@iteration1)&lt;br /&gt;
* David Hughes (@DavidHugh3s)&lt;br /&gt;
* The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol (@joshsokol)&lt;br /&gt;
* David Lister&lt;br /&gt;
* Phil Beyer (@pjbeyer)&lt;br /&gt;
* #securityisms - The Real APT! - Brian Engle (@brainaengle)&lt;br /&gt;
* Re-integration: Don't fear closed systems - Michael Cote (@cote)&lt;br /&gt;
* Selling Security - Bill Kasper (aka The Hacker Vaccine) (@hackervaccine)&lt;br /&gt;
* Be mean to your code! - James Wickett (@wickett)&lt;br /&gt;
* Implementing Social Sign On(SSO+) in an Large Enterprise Single Sign On(SSO)  Ecosystem - Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133529</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133529"/>
				<updated>2012-07-26T14:25:35Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
* Karthik Gaekwad&lt;br /&gt;
* David Hughes&lt;br /&gt;
* The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol&lt;br /&gt;
* David Lister&lt;br /&gt;
* Phil Beyer&lt;br /&gt;
* #securityisms - The Real APT! - Brian Engle&lt;br /&gt;
* Michael Cote (TENTATIVE)&lt;br /&gt;
* Selling Security - Bill Kasper (aka The Hacker Vaccine)&lt;br /&gt;
* Be mean to your code! - James Wickett&lt;br /&gt;
* Implementing Social Sign On(SSO+) in an Large Enterprise Single Sign On(SSO)  Ecosystem - Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133422</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133422"/>
				<updated>2012-07-24T18:43:25Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
  Be mean to your code! - James Wickett&lt;br /&gt;
  Karthik Gaekwad&lt;br /&gt;
  David Hughes&lt;br /&gt;
  Ernest Mueller&lt;br /&gt;
  The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol&lt;br /&gt;
  David Lister&lt;br /&gt;
  Phil Beyer&lt;br /&gt;
  #securityisms - The Real APT! - Brian Engle&lt;br /&gt;
  Michael Cote (TENTATIVE)&lt;br /&gt;
  Hacker Vaccine&lt;br /&gt;
  Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133335</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133335"/>
				<updated>2012-07-23T16:10:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
  Be mean to your code! - James Wickett&lt;br /&gt;
  Karthik Gaekwad&lt;br /&gt;
  David Hughes&lt;br /&gt;
  Ernest Mueller&lt;br /&gt;
  The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Josh Sokol&lt;br /&gt;
  David Lister&lt;br /&gt;
  Phil Beyer&lt;br /&gt;
  Brian Engle&lt;br /&gt;
  Michael Cote (TENTATIVE)&lt;br /&gt;
  Hacker Vaccine&lt;br /&gt;
  Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133320</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133320"/>
				<updated>2012-07-23T14:47:04Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
  James Wickett&lt;br /&gt;
  Karthik Gaekwad&lt;br /&gt;
  David Hughes&lt;br /&gt;
  Ernest Mueller&lt;br /&gt;
  Josh Sokol&lt;br /&gt;
  David Lister&lt;br /&gt;
  Phil Beyer&lt;br /&gt;
  Brian Engle&lt;br /&gt;
  Michael Cote (TENTATIVE)&lt;br /&gt;
  Hacker Vaccine&lt;br /&gt;
  Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=133319</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=133319"/>
				<updated>2012-07-23T14:46:37Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    No Vendor slides please!&lt;br /&gt;
&lt;br /&gt;
Come present on InfoSec or AppSec related topics.  Send your submission to either James Wickett in PDF format.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 31st, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' AppSec Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
&lt;br /&gt;
  James Wickett&lt;br /&gt;
  Karthik Gaekwad&lt;br /&gt;
  David Hughes&lt;br /&gt;
  Ernest Mueller&lt;br /&gt;
  Josh Sokol&lt;br /&gt;
  David Lister&lt;br /&gt;
  Phil Beyer&lt;br /&gt;
  Brian Engle&lt;br /&gt;
  Michael Cote (TENTATIVE)&lt;br /&gt;
  Hacker Vaccine&lt;br /&gt;
  Jay Hook&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=132799</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=132799"/>
				<updated>2012-07-09T16:07:17Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* July OWASP Austin Chapter Meeting - Lightning Talks! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July Austin Security Professionals Happy Hour (Sponsored by Security Innovation) ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP so have an idea how many to expect!'''&lt;br /&gt;
&lt;br /&gt;
'''When''' : Thursday July 12th, from 5-7 PM.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlocks Baker Street Pub and Grill at the corner of 183 and Burnet.&lt;br /&gt;
&lt;br /&gt;
'''What is it?:''' The Austin Security Professionals happy hour is a monthly gathering of information security professionals from the Austin area, heavily represented by OWASP and ISSA membership. It is a time to enjoy some drinks and food provided by our sponsor, an to get to know other InfoSec professionals. Come on down and hang out with a bunch of hackers and geeks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Our Sponsor:''' Security Innovation&lt;br /&gt;
&lt;br /&gt;
Security Innovation solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to&lt;br /&gt;
create an ecosystem of repeatable, secure software development - standards, education and assessment. For more than ten years, the company&lt;br /&gt;
has helped organizations build internal expertise and reduce application risk.  The company's flagship products include TeamMentor, the industry's&lt;br /&gt;
largest library of application security eLearning courses, and TeamMentor, &amp;quot;out of the box&amp;quot; secure development standards.&lt;br /&gt;
&lt;br /&gt;
There will be a $100 Amazon.com card giveaway, so bring a business card! &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3698065012&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== July OWASP Austin Chapter Meeting - Lightning Talks! ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Want to try out your presentation skills? Here's your chance!  OWASP Austin presents &amp;quot;Lightning Talks&amp;quot; for the July chapter meeting. This will be a back-to-back series of 5 minute, controlled presentations. Lightning talks are an excellent way to hone your presentation skills by testing your ability to present clear ideas with defined time and presentation restrictions. It can also be a lot of fun!&lt;br /&gt;
&lt;br /&gt;
 Here is the criteria:&lt;br /&gt;
&lt;br /&gt;
    Each talk must be 5 minutes in length&lt;br /&gt;
    Each slide deck will contain exactly 20 slides&lt;br /&gt;
    The slides will auto-advance every 15 seconds&lt;br /&gt;
    Try not to be too vendor-oriented.&lt;br /&gt;
&lt;br /&gt;
We're thinking of an OWASP Top 10 Theme if we can get each of the 10 represented, but submit anything you like! (Preferably InfoSec related.) Send your submission to either James Wickett or David Hughes in PDF format so that we can quickly decide on the ones to be presented.&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 30th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Why, YOU of course. :-D&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Lightning Talks!&lt;br /&gt;
&lt;br /&gt;
'''Speakers'''&lt;br /&gt;
- James Wickett&lt;br /&gt;
- Karthik Gaekwad&lt;br /&gt;
- David Hughes&lt;br /&gt;
- Ernest Mueller&lt;br /&gt;
- Josh Sokol&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have enough for all and be eligible for our monthly book giveaway! (I will make the RSVP link available soon). &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3873941062&lt;br /&gt;
&lt;br /&gt;
Questions? call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
'''When:''' June 26th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Measuring the Root Shell Index &lt;br /&gt;
&lt;br /&gt;
'''Who:'''HD Moore&lt;br /&gt;
&lt;br /&gt;
'''Synopis:''' Determining the realistic scope of a particular advisory or vulnerability using large scale reconnaissance with analytics.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free, of course&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Oh yeah, Taco Deli time! &lt;br /&gt;
&lt;br /&gt;
'''Location:''' National Instruments, 11500 N. Mopac.Building C&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3697966718 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 14th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by WhiteHat Security.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
'''When:''' May 29th, from 11:30a-1:00pm&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
Abstract:Closing the window of opportunity” and will be discussing the state of web application security based on recent statistics drawn from WhiteHat’s database of thousands of sites under service and the characteristics of a program that can help organizations develop a strong web security posture and reduce or eliminate the opportunities attackers have to compromise their applications.&lt;br /&gt;
&lt;br /&gt;
This will be a product agnostic presentation, of course, though we will be using WhiteHat data (along with Jim’s long experience) to present the problems we see and how we can go about solving them.&lt;br /&gt;
&lt;br /&gt;
'''Who: Jim Manico and Siri De Licori of WhiteHat Security'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Siri De Licori is a Product Manager for WhiteHat Security.  He led the development of a pre production Dynamic Analysis Software Testing (DAST) service line, and is working to bring out product enhancements which take greater advantage of WhiteHat’s historical scanning and vulnerability data and integrates DAST and SAST results.  He has also worked with Jeremiah to produce statistics for a number of his quarterly reports and whitepapers.&lt;br /&gt;
&lt;br /&gt;
Siri comes from a background of 10 years of development.  He worked with a small software company working on an early rapid application development tool that produced code from UML diagrams, a small nonprofit on a tool to permit English and Chinese speakers to study the bible in its original tongues without learning those ancient languages, and a couple Fortune 500 companies helping them process, utilize, and analyze their financial data.  Before being recruited into product management he specialized in building database systems and data analytics.&lt;br /&gt;
&lt;br /&gt;
Siri works at WhiteHat’s home office in Santa Clara and lives in San Francisco.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the VP of Security Architecture for WhiteHat Security. Jim is part of the WhiteHat Static Analysis Software Testing (SAST) team, leading the data-driven, Web service portion of the SAST service. He also provides secure coding and developer awareness training for WhiteHat using his 7+ years of experience delivering developer-training courses for SANS, Aspect Security and others.&lt;br /&gt;
 &lt;br /&gt;
Jim brings 15 years of database-driven Web software development and analysis experience to WhiteHat. He has helped deliver Web-centric software systems for Sun Microsystem, Fox Media (MySpace), several Fortune 500's, and major NGO financial institutions. He holds expertise in a variety of areas, includingWeb-based J2EE development, thick-client and applet-based Java applications, hybrid Java, C++ and Flash applications, Web-based PHP applications, rich-media Web applications using advanced Ajax techniques, Python REST Webservice development, and Database technology using Oracle, MySQL and Postgres.&lt;br /&gt;
 &lt;br /&gt;
A host of the OWASP Podcast Series, Jim is the committee chair of the OWASP Connections Committee and is a significant contributor to various OWASP projects.&lt;br /&gt;
 &lt;br /&gt;
Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Free&lt;br /&gt;
 &lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3418570035&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 10th, 5:00pm-7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, May 10th, Sponsored by Rapid7.&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlocks&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 24th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
&lt;br /&gt;
Abstract:  Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise.  The leading mitigation strategy is a combination of user awareness training and email filtering.  This talk outlines a proposed solution that brings email risk and awareness information down to the client level in order to better equip end users in making secure decisions when using email.&lt;br /&gt;
&lt;br /&gt;
Anti-spam capabilities have been incorporated into email client applications for some time now.  These are usually in the form of junk boxes or email filters that attempt to identify spam or other unwanted email.  Most anti-spam clients use bayesian filtering to determine whether an email is spam or not spam, typically using word combinations and statistical analysis to make a determination.  Many experts also advise wary email users to examine the raw email headers in order to attempt to find evidence of an email attack.  While this is not bad advise, it is however a highly technical process and one cannot expect the majority of email users to be able to carry out and act upon this advice.  This is the problem that the proposed Advanced Email Risk Classification and Recipient Decision Assistance solution attempts to solve.  The operating name for this solution is Phish Finder.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Aaron Estes, Cigital&lt;br /&gt;
&lt;br /&gt;
Aaron Estes came to Cigital from Lockheed Martin where he spend 10 years in the software engineering and security engineering fields. He began his information security career as a system security engineer on the F-35 program.  Aaron has spent the last 5 years as a security engineer and penetration tester for Lockheed Martin Enterprise Business Services specializing in application penetration testing and user awareness/social engineering testing.  Aaron is also a professor at Southern Methodist University in Dallas where he teaches senior and graduate level security courses.  He has nearly completed his Doctor of Engineering in Software Engineering at Southern Methodist University, has a Masters in Software Engineering from Southern Methodist University and has a Bachelors in Computer Science from University of Texas.  Aaron is a Certified Information System Security Professional.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3182987401&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:'''April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''What: ''' Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.&lt;br /&gt;
&lt;br /&gt;
'''Where: Sherlocks'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 1:00pm-5:00pm&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be writing Cucumber acceptance and security tests while we build an app as a group.  In the lab, we will have several groups working together writing cucumber tests and code along the way.  Even if you are not a developer or security expert, this event is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:'''  Free, but limited to 30 seats.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3183041563&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
'''Who: ''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=126789</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=126789"/>
				<updated>2012-03-23T19:34:09Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* March Chapter Meeting. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Upcoming Events=&lt;br /&gt;
=== March Chapter Meeting.===&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 27th, from 11:30a-1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:''': Cucumber and friends: tools for security that matters&lt;br /&gt;
&lt;br /&gt;
Behavior-Driven Development (BDD) helps focus software development on delivering prioritized, verifiable business value by providing a common vocabulary that spans the divide between Business and Technology. Cucumber is a widely used tool in Ruby community for implementing BDD and it executes plain-text functional descriptions as automated tests. In this talk, Mani and Tin will discuss how Cucumber and related tools can be used to define and verify security features that matter in software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' Mani Tadayon and Tin Zaw&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Mani Tadayon, Senior Software Engineer, AT&amp;amp;T Interactive'''&lt;br /&gt;
&lt;br /&gt;
At AT&amp;amp;T Interactive, Mani is part of the team responsible for YP.com. Mani studied foreign languages at UC Berkeley, computer science at Cal State Hayward and is now a graduate student in Geography at Cal State Northridge. He has been developing web applications using open source tools for over 10 years. Currently, his focus is on behavior-driven development with Ruby.&lt;br /&gt;
&lt;br /&gt;
'''Tin Zaw, OWASP and AT&amp;amp;T Interactive'''&lt;br /&gt;
&lt;br /&gt;
Tin is currently the president of OWASP Los Angeles chapter. During day time, he works with Mani at AT&amp;amp;T Interactive as an application security architect. Before AT&amp;amp;T, he worked as a software engineer, manager and researcher at QUALCOMM, Inktomi (now Yahoo!), Symantec, MySpace and a Sequoia funded Internet infrastructure startup.&lt;br /&gt;
&lt;br /&gt;
Tin holds CISSP and CSSLP certifications from (ISC)2, MS in Computer Science from University of Southern California, and working on an MBA from USC.&lt;br /&gt;
&lt;br /&gt;
*Cost:* Free, of course, but please RVSV!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Food:* Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have&lt;br /&gt;
enough for all!&lt;br /&gt;
&lt;br /&gt;
*Location:* National Instruments, 11500 N. Mopac.&lt;br /&gt;
&lt;br /&gt;
*Time:* March 27th, 11:30a - 1:00p&lt;br /&gt;
&lt;br /&gt;
*Questions?* call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
RSVP: http://www.eventbrite.com/event/3147433057&lt;br /&gt;
&lt;br /&gt;
=== Austin Security Professionals Happy Hour, April 19th, Sponsored by Robert Half International.===&lt;br /&gt;
&lt;br /&gt;
'''What:''' Great conversation, and the beer and food are covered! This is a popular montly event with lots of folks from OWASP, ISSA, and others! This is a wonderful networking opportunity!&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 19th, from 5pm-7pm&lt;br /&gt;
&lt;br /&gt;
'''Where''': Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
'''How?''' Our Sponsor: Founded in 1948, Robert Half International (RHI) is the world's first and largest specialized staffing firm. RHI is a recognized leader in professional staffing and consulting services, and is the parent company of Protiviti, a global consulting and internal audit firm composed of experts in risk and advisory services.&lt;br /&gt;
&lt;br /&gt;
Cost: None to you! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RSVP:'''http://www.eventbrite.com/event/3147495243&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
* March 27, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Cucumber and friends: tools for security that matters (Mani Tadayon &amp;amp; Tin Zaw)&lt;br /&gt;
* April 19, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Robert Half International)&lt;br /&gt;
* April 24, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
* May 10, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* May 29, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: &amp;quot;Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
* June 14, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* June 26, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: 'The Jane Austen Software Development Model'(Wendy Nather, 451Group)&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
=Record Hall of Meetings=&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 8, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fireeye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 28, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Rackspace)&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://www.eventbrite.com/event/2967474797&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: Half-Day Threat Modeling Seminar with John Steven of Cigital'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Steven(Cigital)&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center, Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Weirdos&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
=Presentation Archives=&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
=Austin OWASP Chapter Leaders=&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
=Sponsorship Opportunities=&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
=Local News=&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=125170</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=125170"/>
				<updated>2012-02-28T19:16:17Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* February Chapter Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===February Chapter Meeting===&lt;br /&gt;
&lt;br /&gt;
*Description:Testing From the Cloud: Is the Sky Falling?&lt;br /&gt;
 &lt;br /&gt;
More and more IT is being moved to the cloud, why shouldn't your testing&lt;br /&gt;
move there too? This talk will cover what it takes to take your testing&lt;br /&gt;
tools from your laptop to the cloud using new features of the OWASP Web&lt;br /&gt;
Testing Environment (WTE). WTE allows you to create custom installations&lt;br /&gt;
of application security tools in the cloud on demand. Has your IP been&lt;br /&gt;
shunned? No problem, kill that cloud instance and startup another. Is&lt;br /&gt;
your life as mobile as your phone? No problem, a laptop + Internet =&lt;br /&gt;
access to all your favorite tools from anywhere. Multiple clients? No&lt;br /&gt;
problem, start an an instance for each one. By the end of this talk,&lt;br /&gt;
you'll know all you need to fire up an cloud instance with all of your&lt;br /&gt;
favorite tools and start having fun.&lt;br /&gt;
&lt;br /&gt;
*Slides: [[File:WTE-Cloud-Austin-2012-02.pdf]]&lt;br /&gt;
&lt;br /&gt;
*Speaker: Matt Tesauro*&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly&lt;br /&gt;
involved in many OWASP projects and committees. Matt is the project&lt;br /&gt;
leader of the OWASP WTE (Web Testing Environment) which is the source of&lt;br /&gt;
the OWASP Live CD Project and Virtual Machines pre-configured with tools&lt;br /&gt;
and documentation for testing web applications. Industry designations&lt;br /&gt;
include the Certified Information Systems Security Professional (CISSP)&lt;br /&gt;
and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics&lt;br /&gt;
and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
*Cost:* Free, of course, but please RVSV!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Food:* Oh yeah, Taco Deli time! Please RSVP so we'll be sure to have&lt;br /&gt;
enough for all!&lt;br /&gt;
&lt;br /&gt;
*Location:* National Instruments, 11500 N. Mopac.&lt;br /&gt;
&lt;br /&gt;
*Time:* February 28th, 11:30a - 1:00p&lt;br /&gt;
&lt;br /&gt;
*Questions?* call: David Hughes (512) 589-4623&lt;br /&gt;
&lt;br /&gt;
*RSVP*: http://www.eventbrite.com/event/2967474797&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be streaming this meeting again. I will post the link soon.&lt;br /&gt;
&lt;br /&gt;
== Half-Day Threat Modeling Seminar with John Steven of Cigital ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: &amp;quot;Threat Modeling&amp;quot;'''&lt;br /&gt;
&lt;br /&gt;
How will attackers break your web application? How much security testing is enough? Do I have to worry about insiders? Threat modeling, applied with a risk management approach can answer both of these questions if done correctly. This talk will present advanced threat modeling step-wise through examples and exercises using the Java EE platform and focusing on authentication, authorization, and session management.&lt;br /&gt;
&lt;br /&gt;
Participants will learn, through interactive exercise on real software architectures, how to use diagramming techniques to explicitly document threats their applications face, identify how assets worth protecting manifest themselves within the system, and enumerate the attack vectors these threats take advantage of. Participants will then engage in secure design activities, learning how to use the threat model to specify compensating controls for specified attack vectors. Finally, we'll discuss how the model can drive security testing and validate an application resists specified attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Presenter: John Steven'''&lt;br /&gt;
&lt;br /&gt;
John Steven is the Senior Director, Advanced Technology Consulting at Cigital with over a decade of hands-on experience in software security. John's expertise runs the gamut of software security from threat modeling and architectural risk analysis, through static analysis (with an emphasis on automation), to security testing. As a consultant, John has provided strategic direction as a trusted advisor to many multi-national corporations. John's keen interest in automation keeps Cigital technology at the cutting edge. He has served as co-editor of the Building Security In department of IEEE Security &amp;amp; Privacy magazine, speaks with regularity at conferences and trade shows, and is the leader of the Northern Virginia OWASP chapter. John holds a B.S. in Computer Engineering and an M.S. in Computer Science both from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Location:'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Microsoft Technology Center,&lt;br /&gt;
Quarry Oaks 2, 10900 Stonelake Blvd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Time:'''&lt;br /&gt;
&lt;br /&gt;
February 9th, from 1:00pm to 4:30pm&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Cost:'''&lt;br /&gt;
&lt;br /&gt;
The cost is free, but seating is limited, so register soon at the below link!&lt;br /&gt;
&lt;br /&gt;
http://austinthreatmodel2012.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This will be an outstanding opportunity that you do no want to miss!! Refreshments will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The meeting will be followed by our regular monthly happy hour. See below! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Austin Information Security Happy Hour ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 9th, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cigital) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' TBD&lt;br /&gt;
&lt;br /&gt;
Be there for drinks, food and good conversation! RSVP at:&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/2841728687&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
* December 2011 - No Meeting (Happy Holidays!)&lt;br /&gt;
* January 19, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by SOS Security and Gigamon)&lt;br /&gt;
* January 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: What's in Your Program? Application Security Maturity in 2012 (Joel Scambray, Cigital)&lt;br /&gt;
* February 9, 2012 - 1 PM to 5 PM - OWASP/ISSA Half-Day Seminar: Threat Modeling (John Steven, Cigital)&lt;br /&gt;
* February 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Cigital)&lt;br /&gt;
* February 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Testing from the Cloud: Is the Sky Falling?(Matt Tesauro, Rackspace)&lt;br /&gt;
* March 8, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Fireeye)&lt;br /&gt;
* March 27, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* April 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Robert Half International)&lt;br /&gt;
* April 24, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
* May 10, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* May 29, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: &amp;quot;Closing the window of opportunity&amp;quot;(Jim Manico and Siri De Licori of WhiteHat Security)&lt;br /&gt;
* June 14, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* June 26, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: 'The Jane Austen Software Development Model'(Wendy Nather, 451Group)&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: OWASP Lightning Talks&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:WTE-Cloud-Austin-2012-02.pdf&amp;diff=125169</id>
		<title>File:WTE-Cloud-Austin-2012-02.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:WTE-Cloud-Austin-2012-02.pdf&amp;diff=125169"/>
				<updated>2012-02-28T19:15:12Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=123193</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=123193"/>
				<updated>2012-01-25T16:54:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* Chapter Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:david.hughes@owasp.org David Hughes, President/Conference Chair], [mailto:benlbroussard@gmail.com Ben Broussard, Vice President],[mailto:josh.sokol@owasp.org Josh Sokol, Conference Chair], [mailto:james.wickett@owasp.org James Wickett, Conference Chair], [mailto:rich.vazquez@gmail.com Rich Vazquez, Board Member], [mailto:ggenung@gmail.com Greg Genung, Board Member]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 19, 2012, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by SOS Security and Gigamon. They will be giving away an Apple TV!) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 31, 2012, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' What's in Your Program?  Application Security Maturity in 2012&lt;br /&gt;
&lt;br /&gt;
Take a tour of the most successful software security initiatives in the world through this presentation of research into application security practices at over 40 well-known companies.  From strategy &amp;amp; metrics to penetration testing, this study measured over 100 software security activities across 12 areas, as they are practiced &amp;quot;in the wild.&amp;quot; Comparative statistics as well as period-over-period progress will be covered. You'll come away from this presentation armed with the facts to plan, implement, and/or enhance your own software security program based on real-world results.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joel Scambray (Cigital)&lt;br /&gt;
&lt;br /&gt;
Joel Scambray has over 15 years of experience assisting companies ranging from newly minted startups to members of the Fortune 500 address information security challenges and opportunities. Joel leads Cigital’s Texas regional practice and focuses on developing and sustaining successful client relationships through oversight of delivery, recruiting, and business development at the regional level. He also contributes to the development of consulting practices and products, and influences Cigital’s evolving thought leadership around information security. Joel’s background includes roles as an executive, technical consultant, and entrepreneur. He co-founded and lead information security consulting firm Consciere for 3 years before it was acquired by Cigital in June of 2011. He has been a Senior Director at Microsoft Corporation, where he provided security leadership in Microsoft's online services and Windows divisions. Joel also co-founded security software and services startup Foundstone Inc. and helped lead it to acquisition by McAfee in 2004. Joel is widely recognized as co-author of Hacking Exposed: Network Security Secrets &amp;amp; Solutions, the international best-selling computer security book that first appeared in 1999. He is also lead author of the Hacking Exposed Windows and Web Applications series. Joel holds a BS from the University of California at Davis, a MA from UCLA, and he is a Certified Information Systems Security Professional (CISSP).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: David Hughes (512) 589-4623. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2658939961 RSVP on Eventbrite]&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
* December 2011 - No Meeting (Happy Holidays!)&lt;br /&gt;
* January 19, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by SOS Security and Gigamon)&lt;br /&gt;
* January 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: What's in Your Program? Application Security Maturity in 2012 (Joel Scambray, Cigital)&lt;br /&gt;
* February 9, 2012 - 1 PM to 5 PM - OWASP/ISSA Half-Day Seminar: Threat Modeling (John Steven, Cigital)&lt;br /&gt;
* February 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Cigital)&lt;br /&gt;
* February 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Testing from the Cloud: Is the Sky Falling?(Matt Tesauro, Rackspace)&lt;br /&gt;
* March 8, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour (Sponsored by Fireeye)&lt;br /&gt;
* March 27, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* April 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* April 24, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting: Anatomy of Advanced Email Attacks (Aaron Estes, Cigital)&lt;br /&gt;
* May 10, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* May 29, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* June 14, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* June 26, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* July 12, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* July 31, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* August 9, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* August 28, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* September 13, 2012 - 5 PM to 7 PM - Austin Security Professionals Happy Hour&lt;br /&gt;
* September 25, 2012 - 11:30 AM to 1 PM - Austin OWASP Meeting&lt;br /&gt;
* October 23-26, 2012 - 8 AM to 5 PM - AppSec USA/LASCON 2012 in Austin, TX!&lt;br /&gt;
* November 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
* December 2012 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2011, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center, Austin, TX&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by HP/Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 27, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' STAAF: A FLOSS Framework for Scalable and Sharable Android App Analysis&lt;br /&gt;
&lt;br /&gt;
With no end of Android malware anywhere in sight, it’s no wonder that so many Android analysis tools have been released lately.  While each of these powerful tools makes great strides in finding artifacts in an individual application, they’re typically not designed to scale beyond a few thousand selected samples at most.  In order to effective insight into android applications researchers need to be be able to analyze a substantial subset of the 300k+ applications in the official store, all of the applications across the disparate unofficial Android stores and repositories, as well as ad-hoc manually-submitted applications.  This was the motivation for STAAF, a Scalable Tailored Application Analysis Framework.  STAAF was designed to allow an analyst to easily add/remove/configure various analysis modules, then process large numbers of applications at once or over time, then share the raw data, processed data, and results with other organizations.  In this presentation I’ll cover the STAAF Architecture, the current status and available implementation, and if circumstances permit, show a quick demo with a handful of applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ryan Smith (Praetorian)&lt;br /&gt;
&lt;br /&gt;
At Praetorian, Ryan's current focus is on the development of technology and systems in support of computer network defense, attack, and exploitation. Prior to joining Praetorian, Ryan Smith was an Associate Staff member of the Information Systems Technology Group at MIT Lincoln Laboratory. His previous work at Lincoln Labs was in the code analysis group, in which he focused on the development of a prototype tool to automate the malware analysis process using information flow and virtual machine introspection. Prior to Lincoln Laboratory, Mr. Smith worked at 21st Century Technologies and Applied Research Labs in Austin, TX, and PricewaterhouseCoopers in Dallas, TX. Previous work has included graph-based network attack correlation, steganography, netflow traffic analysis, vulnerability and risk analysis, and identity management.&lt;br /&gt;
&lt;br /&gt;
Ryan has been an active member of the Honeynet Project since 2002, in which he participated in the testing and development of various honeynet technologies, and was invited to give several talks on the usefulness of honeynets for strengthening network security as well as research. While at the University of Texas, Ryan was the head of the local information security group on campus, and the organizer of the local cyber &amp;quot;capture the flag&amp;quot; exercise. As a result of this position, he was invited to a NFS funded workshop to determine the efficacy of a National Collegiate Cyber Defense Exercise, and subsequently assisted in the organization of the inaugural Collegiate Cyber Defense Competition, which now hosts over 50 Universities in 8 regional qualifiers and a finalist round in San Antonio. While at the University of Texas, Ryan also led a team of graduate students to design and implement a prototype of an automated polymorphic shellcode analyzer to extract the system calls and parameters of arbitrarily obfuscated Windows shellcode.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP). Ryan received a B.S in Electrical Engineering from The University of Texas in Austin, where he focused on information assurance and network communications. Ryan received a M.S. in Security informatics from Johns Hopkins, where he focused on network and systems security as well as privacy and technical public policy.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 30, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data Exfiltration&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers. Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams. &lt;br /&gt;
&lt;br /&gt;
In this session we will cover:&lt;br /&gt;
&lt;br /&gt;
* Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
&lt;br /&gt;
* Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
&lt;br /&gt;
* Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Joe Brady (Veracode)&lt;br /&gt;
&lt;br /&gt;
Joe Brady is a Senior Solutions Architect at Veracode with over 25 years of experience in software application development and security. His professional experience includes advising customers on data at rest encryption solutions at Credant Technology, IT risk and portfolio management at Prosight (now Oracle), and application software development as a consultant and software development manager for various companies. Joe began programming as a physics undergrad and developed early microprocessor based instrumentation at Cornell, where he received a Master of Science degree in Applied and Engineering Physics. He has had an interest in software security, and backdoors in particular, since reading “Reflections on Trusting Trust” by Ken Thompson where he describes planting what we now call a backdoor in the UNIX compiler.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/2064867073 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 18, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 28, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Introduction to the OWASP Secure Coding Practices Quick Reference Guide&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Coding Practices Quick Reference Guide is a technology agnostic set of general software security coding practices, in a comprehensive checklist format, that can be integrated into the development life-cycle. At only 17 pages long, it is easy to read and digest.&lt;br /&gt;
&lt;br /&gt;
The focus is on secure coding requirements, rather than on vulnerabilities and exploits. In this respect it is targeted more precisely for the development community, as opposed to the security community.&lt;br /&gt;
&lt;br /&gt;
This presentation will introduce this OWASP project and discuss some of the core concepts and principles of the requirements.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Keith Turpin CISSP, CSSLP, CRISC (Boeing)&lt;br /&gt;
&lt;br /&gt;
Keith leads Boeing’s enterprise application security assessment team. He previously served as the lead IT security advisor for all of Boeing’s international operations. &lt;br /&gt;
&lt;br /&gt;
Keith represents Boeing on the International Committee for Information Technology Standard's cyber security technical committee and serves as a U.S. delegate to the International Standards Organization's sub-committee on cyber security.&lt;br /&gt;
&lt;br /&gt;
Keith is the project leader for the OWASP Secure Coding Practices Quick Reference Guide and is a member of the OWASP Global Projects Committee. He also spent four years as the Director of Communication for the Seattle chapter of the Information Systems Security Association.  &lt;br /&gt;
&lt;br /&gt;
He is a frequent speaker at conferences, professional organizations and corporations on a variety of security topics.   &lt;br /&gt;
&lt;br /&gt;
Keith holds a BS in Mechanical Engineering and MS in Computer Systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://www.eventbrite.com/event/1696750025 RSVP on Eventbrite] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2011, 1:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Penetration Testing with Metasploit Half-Day Seminar&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Microsoft Technology Center (Quarry Oaks 2, 10900 Stonelake Blvd, Suite 225, Austin, TX 78759)&lt;br /&gt;
&lt;br /&gt;
'''NOTE:''' This training is SOLD OUT, but you can put your name on the waiting list at http://metasploit.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 31, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Why Hackers.org Doesn't Get Hacked&lt;br /&gt;
&lt;br /&gt;
Ha.ckers.org has suffered nearly every attack a website can. These attacks include robots, sophisticated web-based attacks, brute force, denial of service, and network based attacks. This speech will explain the other side of protecting high risk websites - the configurations, operating system, and network.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Flom (SecTheory)&lt;br /&gt;
&lt;br /&gt;
Mr. Flom has been working in the computer industry for the past sixteen years and has spent the last twelve heavily involved in computer and network security. As lead operations engineer of Pilot Network Services' security department he researched network and computer threats on a daily basis protecting some of the largest companies and organizations in the world. He designed and implemented what was believed to be at the time, the largest network intrusion detection system in the world, protecting over half a million computers.&lt;br /&gt;
&lt;br /&gt;
Mr. Flom later joined Digital Island (acquired by Cable &amp;amp; Wireless and merged with Exodus), where he created new product offerings for the Security Operations Center he was brought on to build. After the merger with Exodus James joined the Cyber Attack Tiger Team and assisted with the detection and recovery of several global network security compromises. Mr. Flom later became the director of consulting services for Kliosystems before co-founding SecTheory. He is a member of IACSP.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 5, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by FireEye) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 26, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Rugged Dev: Building Reliability and Security Into Software&lt;br /&gt;
&lt;br /&gt;
Complex systems fail over time and the larger they are, the more likely they are to fail in unforeseen ways. Come hear about the best practices we used and lessons learned when we built very large scale cloud-based products. Once exposed to the Internet, complex multi-tenant Web systems encounter a wide range of input from a variety of sources but still have to be long running and behave resiliently in the face of failures. We will examine 3 implementations of Rugged best practices to design and test your software for ruggedness. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments)&lt;br /&gt;
&lt;br /&gt;
James graduated from the University of Oklahoma in 2004 with a BBA in MIS, where he also ran a Web startup company.  He joined the IT division of National Instruments, where he helped run the NI Web site, ni.com, for several years.  In 2007 he moved on to lead the Web division of a rapidly growing local publisher, Community Impact.  In 2010, he came back to NI, this time to the LabVIEW R&amp;amp;D group, where he leads up security and operations for several cloud-based SaaS products.  Over the last several years, James has been involved in the Austin chapter of OWASP as the Chapter President (2007-2009) and as the Chapter VP (2010-present).  With his involvement in OWASP, he also co-chaired the Lonestar Application Security Conference (LASCON) which was the first OWASP conference in Austin.&lt;br /&gt;
&lt;br /&gt;
He is a security expert, bearing CISSP, GCFW, GWAS, and CCSK certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 14, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Veracode) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 29, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending Using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (Praetorian)&lt;br /&gt;
&lt;br /&gt;
Matt has been involved in the Information Technology industry for more than 10 years. Prior to joining Praetorian, Matt was a Security Consultant at Trustwave's Spider Labs. Matt's focus has been in application security including testing, code reviews, design reviews and training. His background in web application development and system administration helped bring a holistic focus to Secure SDLC efforts he's driven. He has taught both graduate level university courses and for large financial institutions. Matt has presented and provided training a various industry events including DHS Software Assurance Workshop, AppSec EU, AppSec US, AppSec Academia, and AppSec Brazil.&lt;br /&gt;
&lt;br /&gt;
Matt is currently on the board of the OWASP Foundation and highly involved in many OWASP projects and committees. Matt is the project leader of the OWASP WTE (Web Testing Environment) which is the source of the OWASP Live CD Project and Virtual Machines pre-configured with tools and documentation for testing web applications.&lt;br /&gt;
&lt;br /&gt;
Industry designations include the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH). Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Infoblox) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 22, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Supercharged Password Cracking Techniques&lt;br /&gt;
&lt;br /&gt;
In the past 2-3 years there have been many important discoveries/releases in&lt;br /&gt;
the world of password cracking. Between massive password leaks (like RockYou,&lt;br /&gt;
Gawker, etc) and the release of many free tools that take advantage of &lt;br /&gt;
the processing power of GPU cards, there are many new techniques/tools/tricks&lt;br /&gt;
that security professionals should be taking advantage of while cracking &lt;br /&gt;
passwords. But, by default tools you download (Like John the Ripper) do not&lt;br /&gt;
take advantage of this.&lt;br /&gt;
&lt;br /&gt;
Over the past 12 years, Rick has been collecting password hashes from various&lt;br /&gt;
large corporations (during authorized penetration tests). For years now, he &lt;br /&gt;
has been cracking these passwords, and discovering more and more patterns that&lt;br /&gt;
users are using. But the majority of password cracking tools out there&lt;br /&gt;
(Such as John the Ripper, L0phtCrack, etc) do not take advantage of these &lt;br /&gt;
&amp;quot;human weaknesses&amp;quot; in password creation. So far Rick has cracked almost 4 &lt;br /&gt;
million hashes from inside corporate America, and an additional 5+ million &lt;br /&gt;
from sources over the Internet.&lt;br /&gt;
&lt;br /&gt;
During this talk Rick will talk about the current state of password cracking&lt;br /&gt;
by walking the attendees through a PWDUMP output file containing 49000+ &lt;br /&gt;
real &amp;quot;complex&amp;quot; NTLM passwords) how the default rule-set provided by John &lt;br /&gt;
the Ripper can be improved to crack tens of thousands of additional passwords. &lt;br /&gt;
Wordlists/Dictionaries will be shared that can help you better crack &lt;br /&gt;
passwords (these wordlists were created based on what users are _actually_ &lt;br /&gt;
doing in Fortune 500 environments). New &amp;quot;rules&amp;quot; will be given out that were &lt;br /&gt;
created to specifically attack the patterns that users are choosing.&lt;br /&gt;
&lt;br /&gt;
This is relevant to OWASP, because the applications we are developing/securing&lt;br /&gt;
almost always have logins and passwords that protect them. But, unlike Operating&lt;br /&gt;
Systems, our web applications do not usually have strict password requirements&lt;br /&gt;
that users have to meet in order to create an account. We do this as to not&lt;br /&gt;
scare away users; but we are placing our OWN systems at risk. &lt;br /&gt;
&lt;br /&gt;
Even now, sites like Google/Twitter/Facebook only warn the users about poor&lt;br /&gt;
passwords, or have a list of 500 passwords that are not allowed. This will&lt;br /&gt;
_not_ be the case in 10 years.  Lets address this problem now.&lt;br /&gt;
&lt;br /&gt;
The only way to address the problem, is to first become aware of how bad&lt;br /&gt;
our users are at choosing passwords , and what we can do (as developers or&lt;br /&gt;
security professionals) to help protect our users from themselves.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rick Redman (Korelogic)&lt;br /&gt;
&lt;br /&gt;
During his 12 years as a security practitioner, Rick has delivered numerous&lt;br /&gt;
application and network penetration tests for a wide range of Fortune 500&lt;br /&gt;
and government clients.  He serves as KoreLogic's subject matter expert in&lt;br /&gt;
advanced password cracking systems and coordinated the &amp;quot;Crack Me if You Can&amp;quot;&lt;br /&gt;
Contest at DefCon 2010. Additionally, Rick presents at a variety of security&lt;br /&gt;
forums such as the Techno-Security Conference, ISSA Chapters and AHA (Austin&lt;br /&gt;
Hackers Anonymous).  Rick also provides technical security training on&lt;br /&gt;
topics such as web application security. Rick also delivers web application&lt;br /&gt;
security training to management, developers and security staff. Rick has&lt;br /&gt;
served as a member of a penetration testing tiger team supporting Sandia&lt;br /&gt;
National Laboratories.  Mr. Redman is a graduate of Purdue University with a&lt;br /&gt;
degree in Computer Science from the COAST/CERIAS program under Eugene Spafford.&lt;br /&gt;
Rick started performing application layer security tests of applications in&lt;br /&gt;
2000, before inline web-proxies existed.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 10, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Cisco) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 25, 2011, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Smart Phones with Dumb Apps&lt;br /&gt;
&lt;br /&gt;
Enterprises are targeting both internal users and customers with smartphone applications for platforms such as Apple iPhone and Google Android. Many of these applications are constructed without fully considering the associated security implications of their deployment. Breaches can impact both users as well as the enterprise distributing the application as attackers take advantage of expanded access to sensitive data and network services. This talk discusses emerging threats associated with deploying smartphone applications and provides an overview of the threat modeling process. The presentation then walks example applications from an attacker’s perspective demonstrating the sort of information they are able to extract allowing for more advanced attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Principal, Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization's technology team overseeing methodology development and project execution for Denim Group's customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. In addition, Dan Cornell performed as the CTO of BrandDefense, architecting and developing their cutting-edge intellectual property protection technologies. Over a one year period of development he brought their web-based intellectual property protection technologies through three major versions, surpassing the applications of well funded and entrenched competitors. Previously he was the Vice President, Global Competency Leader for Rare Medium's Java and Unix competency center, based in San Antonio, Texas with development centers in New York, San Francisco, Atlanta and Sydney, Australia. He directed the development of best practices and policy for the cornerstone of Rare Medium's technical development arm, specializing in server-side Java application development. Prior to its acquisition by Rare Medium, Cornell was a founder and Vice President of Engineering for Atension, Inc. where he led the technical development team and served as the architect for the company's internal engineering practices. In March 1999, Texas Monthly magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 &amp;quot;Multimedia Whizzes Under Thirty&amp;quot; doing business in Texas.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 13, 2011, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Rapid7) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 29, 2010, 8:00am - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Lonestar Application Security Conference (LASCON)&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Norris Conference Center &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' $100 for OWASP members, $150 for non-members (includes 1 year OWASP membership)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 28, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the overall stability and security of the infrastructure and the ultimately, the business. Presented from the Information Security Officer/Risk Manager point of view, it shows how a strong information security program reduces levels of reputational, operational, legal, and strategic risk by limiting vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on the top concerns of risk managers and how application security fits into the overall risk management process. The audience will be given recommendations on how to improve cost effectiveness and efficiency to achieve business, security, audit, and compliance objectives relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti (Impact Security LLC) &lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has been involved in IT Security for the financial services industry for ten years where he has worked as an Information Security Officer as well as having been responsible for vulnerability and threat management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager of Systems Administration and was the Director of IT Risk Management for the National Basketball Association. He has a broad range of experience in both operations and security. Mr. Perfetti provided governance and guidance over risk and compliance issues for the Americas region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities were primarily to manage the risk for infrastructure related technology and operations. Other duties included audit, business continuity, investigations, and security operations oversight. Most recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention, and Recovery; as well as developing, enhancing, and implementing Security and Risk Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 16, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 31, 2010, 11:30am - 1:00pm&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Application Assessments Reloaded&lt;br /&gt;
&lt;br /&gt;
Trying to integrate Business Software Assurance into Enterprise Risk Management and Information Security Management programs has had issues over the years. Penetration-testing was announced dead over a year ago, but it's still the number one choice of application security professionals when starting out. Can the activities from penetration-testing be re-used and turned into something innovative?&lt;br /&gt;
&lt;br /&gt;
Tools (especially application scanners and secure static analysis tools) have error rates so high, they are useless in the hands of newcomers (even for peripheral security testing). Some organizations have built entire applications around or on top of existing appsec tools. Others are looking to use other kinds of tools, such as process/methodology/workflow tools, to enhance their classic penetration-testing tools.&lt;br /&gt;
&lt;br /&gt;
Even the testing/inspection methodologies themselves are outdated and we're finding that they are challenging or repetitive in many environments. How do current appsec tools and testing/inspection methods work in the cloud? If we re-run the same kinds of tests during dev-test, software quality, and application security cycles, aren't we wasting valuable time and effort?&lt;br /&gt;
&lt;br /&gt;
This presentation will provide discussion around how to solve many of these and other challenges in application security. The focus will be on web applications that use common technologies (HTTP, SQL, Classic XML/HTML, Javascript, Flash) but also updated to today's standards (RESTful transactions, NoSQL, HTML5, Ajax/Json, Flex2).&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andre Gironda&lt;br /&gt;
&lt;br /&gt;
Andre got his start on Unix-TCP/IP hacking before the September that never ended. Bored of embedded platform research by the time the dot-Bomb happened, he joined the largest online auction company, worked as an appsec consultant for many years, and recently joined a large online gaming company. He is known for his quirky mailing-list posts and blog comments -- and at one time wrote for tssci-security.com.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
* August 2011 - [https://www.owasp.org/images/a/a4/Protecting_Your_Applications_From_Backdoors.pdf Protecting Your Applications From Backdoors] by Joe Brady&lt;br /&gt;
&lt;br /&gt;
* June 2011 Half-Day - [http://www.hick.org/~raffi/austin_slides.pptx Penetration Testing with Metasploit] by Raphael Mudge&lt;br /&gt;
&lt;br /&gt;
* May 2011 - [https://www.owasp.org/images/2/2e/Hacking_ha_ckers.pptx Why Ha.ckers.org Doesn't Get Hacked] by James Flom&lt;br /&gt;
&lt;br /&gt;
* February 2011 - [http://www.owasp.org/images/a/af/2011-Supercharged-Slides-Redman-OWASP-Feb.pdf Supercharged Password Cracking Techniques] by Rick Redmond&lt;br /&gt;
&lt;br /&gt;
*September 2010 - [http://www.owasp.org/images/9/97/Technology_and_Business_Risk_Management_How_Application_Security_Fits_In.pdf Technology and Business Risk Management: How Application Security Fits In]&lt;br /&gt;
&lt;br /&gt;
*August 2010 - [http://www.owasp.org/images/1/16/Owasp-austin-2010-gironda-reloaded.ppt Application Assessments Reloaded]&lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More] by Josh Sokol&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.setsolutions.com Set Solutions], [http://www.bluecoat.com Blue Coat Systems],[http://www.fireeye.com FireEye], [http://www.veracode.com Veracode], [http://www.expandingsecurity.com Expanding Security], [http://www.infoblox.com Infoblox], [http://www.cisco.com Cisco], [http://www.rapid7.com Rapid7], [http://www.f5.com F5], [http://www.accuvant.com Accuvant], and [http://www.whitehatsec.com WhiteHat Security] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
A huge thank you as well to [http://www.netiq.com NetIQ] for becoming an OWASP Foundation Corporate Sponsor through our chapter!&lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2011&amp;diff=119652</id>
		<title>Lonestar Application Security Conference 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2011&amp;diff=119652"/>
				<updated>2011-10-28T14:24:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:Lascon800x191.png|800px]]&lt;br /&gt;
&lt;br /&gt;
===== Click [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 here] for information on LASCON 2010. =====&lt;br /&gt;
&lt;br /&gt;
===== SAVE THE DATE: LASCON 2011 is happening on October 28th, 2011 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/954716 https://www.owasp.org/images/c/c5/LASCON_Register_Now.gif]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
[http://www.regonline.com/954716 https://www.owasp.org/images/c/c5/LASCON_Register_Now.gif]&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.regonline.com/?eventID=954716&amp;amp;rTypeID=480930 Non-Members (Includes a 1 year OWASP membership)]&lt;br /&gt;
| $125 Until 7/31/2011 &lt;br /&gt;
| $175 Until 9/30/2011&lt;br /&gt;
| $225 After 9/30/2011&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.regonline.com/?eventID=954716&amp;amp;rTypeID=480929 OWASP Members]&lt;br /&gt;
| $75 Until 7/31/2011&lt;br /&gt;
| $125 Until 9/30/2011&lt;br /&gt;
| $175 After 9/30/2011&lt;br /&gt;
|-&lt;br /&gt;
| [https://www.regonline.com/?eventID=954716&amp;amp;rTypeID=480932 Students with valid Student ID (must be shown at the door)]&lt;br /&gt;
| $50 Until 7/31/2011&lt;br /&gt;
| $75 Until 9/30/2011&lt;br /&gt;
| $100 After 9/30/2011&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2011:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Training ====&lt;br /&gt;
&lt;br /&gt;
We are pleased to announce that this year we will be adding on two different training classes the day before the Lonestar Application Security Conference (LASCON) on '''Thursday, October 27, 2011'''.  These training classes are unlike those you see at most conferences both in content and cost.  If you have already registered for LASCON, simply go to http://www.regonline.com/lascon2011 and select the &amp;quot;Already Registered?&amp;quot; link.  Log in with the e-mail address you registered with and then select to edit your &amp;quot;Agenda&amp;quot;.  Place a check mark in the box for the training you would like to attend (or the FREE happy hour) and select &amp;quot;Continue&amp;quot; to check out.  If you have not already registered for LASCON, you will have the ability to add the training of your choice on the &amp;quot;Agenda&amp;quot; screen of registration.  The trainings are as follows:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;u&amp;gt;TRAINING 1 ($250):&amp;lt;/u&amp;gt;'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Advanced Threat Tactics with Armitage and Metasploit'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Metasploit is a powerful exploit framework and a must-have tool for penetration testers. Armitage builds a workflow on top of the Metasploit framework and exposes its most advanced capabilities. This demonstration and lab oriented session will teach you Metasploit and Armitage for the purpose of emulating adversary tactics. This course will start with the basics and quickly take you into the workflow of modern threats. You'll learn how to create trojan files, manage covert HTTP and HTTPS communications, set  up social engineering attacks, and use pivoting to take over a network.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To participate in the labs, you must have VMWare Player, VMWare Fusion, or VMWare Workstation installed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Raphael has put up some additional information on this class on his website at http://www.fastandeasyhacking.com/threats.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Biography:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Raphael Mudge is a Washington, DC, based code hacker working on a new startup effort. He is the developer of the open source Armitage for Metasploit. Raphael  regularly writes and speaks on security topics. His work has appeared in USENIX ;login:, Linux Journal, and Hakin9. Previously, Raphael worked as a security researcher,  software engineer, penetration tester, and system administrator.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;u&amp;gt;TRAINING 2 ($250):&amp;lt;/u&amp;gt;'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Bootstrapping Your Application Security Program'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This training class is for new managers &amp;amp; leads accountable for integrating Application Security into their enterprise.  The course will walk through various success factors, including a mixture of strategy, policy, and technology considerations.  The course will help attendees develop incremental plans they can employ to make both short-term and long-term measurable improvements to their enterprise Application Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Topics that will be covered include:&amp;lt;br&amp;gt;&lt;br /&gt;
*Goal Setting&lt;br /&gt;
*Running effective pilot programs&lt;br /&gt;
*Working with vendors&lt;br /&gt;
*Roles &amp;amp; responsibilities in application security&lt;br /&gt;
*Getting buy-in from management, development, business, IT, etc.&lt;br /&gt;
*Meeting compliance needs (PCI &amp;amp; others)&lt;br /&gt;
*Measuring success &amp;amp; ROI&lt;br /&gt;
*Reporting to management&lt;br /&gt;
*Scaling your program&lt;br /&gt;
&lt;br /&gt;
'''Biography:'''&amp;lt;br&amp;gt;&lt;br /&gt;
Bankim Tejani specializes in helping large companies stand up application security programs. Currently a Managing Consultant ofat Fortify, An HP Company, Bankim works with leading financials, technology companies, government agencies, and other corporations.  He helps them strategically inject application security processes and technologies into their SDLCs while trying to minimize impact on time to market and maximize ROI.  His prior experience begins with software development and transitions to network security research, red teaming, information security research, and application security consulting &amp;amp; training.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Seats in these trainings will be very limited and registrants will be accepted on a first-come, first-served basis.  Sign up today!&lt;br /&gt;
&lt;br /&gt;
==== Sessions  ====&lt;br /&gt;
&lt;br /&gt;
See http://lascon.org/&lt;br /&gt;
&lt;br /&gt;
==== Volunteers  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Symantec.png|250px|link=http://www.symantec.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:Fortify.png|250px|link=http://www.fortify.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Impactsecurityllc.png|150px|link=http://www.impactsecurityllc.net]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
| [[Image:IBM.png|150px|link=http://www.ibm.com]]&lt;br /&gt;
| [[Image:Imperva_2color_RGB.jpg|250px|link=http://www.imperva.com]]&lt;br /&gt;
| [[Image:Whitehat.gif|250px|link=http://www.whitehatsec.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:radware.png|150px|link=http://www.radware.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:Cigital.png|150px|link=http://www.cigital.com]]&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Atsec.png|150px|link=http://www.atsec.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:Fireeye.png|150px|link=http://www.fireeye.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
| [[Image:Symplified.png|150px|link=http://www.symplified.com]] &amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
== Lanyard Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Praetorian.png|200px|link=http://www.praetorian.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Happy Hour Sponsor ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Breakfast Taco Sponsor ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Honeyapps.jpg|150px|link=http://www.honeyapps.com]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2011 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Hotel Allandale, located right next to the Norris Conference Center, for this year's conference.  You can call the hotel and mention that you would like the $90/night LASCON rate and they should be able to assist you.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hotel Allandale&amp;lt;br&amp;gt;&lt;br /&gt;
7685 Northcross Drive&amp;lt;br&amp;gt;&lt;br /&gt;
Austin, TX 78757&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
http://hotelallandale.com&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The rooms are $90 for a King size room and includes a full breakfast daily and a social hour Monday-Thursday.  Hotel Allandale is walking distance from the Norris Conference Center!&lt;br /&gt;
&lt;br /&gt;
[[Image:Allandale.png|400px]]&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Options  ====&lt;br /&gt;
&lt;br /&gt;
== Booth Sponsorship Opportunities ==&lt;br /&gt;
[[Image:Lascon_2011_booth_sponsorships.png|500px]]&lt;br /&gt;
&lt;br /&gt;
== A La Carte Sponsorship Opportunities ==&lt;br /&gt;
[[Image:Lascon_2011_a_la_carte_1.png|700px]]&lt;br /&gt;
[[Image:Lascon_2011_a_la_carte_2.png|700px]]&lt;br /&gt;
&lt;br /&gt;
Please [mailto:lascon@owasp.org contact us] for more information. &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2011 that will take place at the Norris Conference Center in Austin, TX on October 28, 2011. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2011 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 19th at 12PM CST (GMT -6) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2011&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Conference Website: http://www.lascon.org &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter_Events]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117725</id>
		<title>AppSec USA 2011 chapters workshop agenda</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_USA_2011_chapters_workshop_agenda&amp;diff=117725"/>
				<updated>2011-09-21T02:22:21Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; Join Remotely:  https://www3.gotomeeting.com/join/627842590&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
As part of [http://www.appsecusa.org/ AppSec USA 2011], on '''Wednesday, September 21,2011 at 12:00h-15:00h''' at the Minneapolis Convention Center (Room # TBA), the Global Chapter Committee is organizing a chapter leader workshop for all the chapter leaders that attend the conference. ''Please note that this Workshop will take place on the day before the Conference starts.''&lt;br /&gt;
&lt;br /&gt;
'''Discussion topics include:'''&lt;br /&gt;
* How to improve the current Chapter Leader Handbook?&lt;br /&gt;
* How to start and support new chapters within Canada and the United States?&lt;br /&gt;
* How to support inactive chapters within Canada and the United States?&lt;br /&gt;
* What Governance model is required for OWASP chapters?&lt;br /&gt;
* How can the Global Chapters Committee facilitate the North American chapters?&lt;br /&gt;
* ...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Funding to Attend Workshop ==&lt;br /&gt;
&lt;br /&gt;
If you need financial assistance to attend the Chapter Leader Workshop at AppSec USA, please submit a request to [mailto:tin.zaw@owasp.org Tin Zaw] and [mailto:sarah.baso@owasp.org Sarah Baso] by '''August 8, 2011'''. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Funding for your attendance to the workshop should be worked out in the following order. &lt;br /&gt;
&lt;br /&gt;
# Ask your employer to fund your trip to AppSec USA conference.&lt;br /&gt;
# Utilize your chapter funds.&lt;br /&gt;
# Ask the chapter committee for funding assistance. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While we wish we could fund every chapter leader, due to the limited amount of budget allocated for this event, we may not be able to fund 100% to all the requests. After August 8, we will make funding decision in a fair and transparent manner. When you apply for funding, please highlight your past contributions to OWASP and your future plans for the local chapter and OWASP. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda  ==&lt;br /&gt;
&lt;br /&gt;
Proposed agenda (open for discussion): &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Minneapolis Convention Center - Room TBA&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:00 - 12:15 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Welcome and Introductions&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 12:15 - 1:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Handling chapter finances''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All '' &lt;br /&gt;
&lt;br /&gt;
Current chapter handbook [[:Chapter Handbook: Managing Money|section]] to be elaborated. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:00 - 1:15&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Coffee Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 1:15 - 2:00&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Top 10 advice for new and veteran chapter leaders''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Create list [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda upfront and add action, impact and required support] from the Chapters Committee. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:00 - 2:10&lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(194, 194, 194) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Break&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 15%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | 2:10 - 2:55&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(242, 242, 242) none repeat scroll 0% 0%; width: 75%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''How to cross-pollinate success between Canadian and US chapters?''' &lt;br /&gt;
''Introduction &amp;amp;amp; moderation: Tin Zaw, Participation: All'' &lt;br /&gt;
&lt;br /&gt;
Look for good pollinator mechanisms and [https://www.owasp.org/index.php/Talk:AppSec_USA_2011_chapters_workshop_agenda define 7 goals] to be accomplished by AppSec USA 2012 in Austin, Texas.&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Participants  ==&lt;br /&gt;
&lt;br /&gt;
'''If you plan to attend, please fill in your name and chapter below:'''&lt;br /&gt;
&lt;br /&gt;
* Tin Zaw (Global Chapters Committee Chair) - Los Angeles Chapter &lt;br /&gt;
* Sarah Baso (Global Chapters Committee Administrator)&lt;br /&gt;
* Mandeep Khera (Bay Area Chapter Leader and Global Chapter Committee member)&lt;br /&gt;
* Tom Brennan (New York City Metro Leader and International Board of Directors)&lt;br /&gt;
* Kelly Santalucia (New York City Chapter Administrator / Global Membership Committee Administrator)&lt;br /&gt;
* Sherif Koussa (Ottawa Chapter Leader)&lt;br /&gt;
* Brian Van Norman (Cincinnati Chapter)&lt;br /&gt;
* Jon Bango (Atlanta Chapter)&lt;br /&gt;
* James Wickett (Austin Chapter)&lt;br /&gt;
&lt;br /&gt;
== Remote Participation  ==&lt;br /&gt;
&lt;br /&gt;
There will be WiFi, so we can set up a Skype or WebEx conference call for people who want to listen in or participate remotely. &lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] if you are interested in participating remotely.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapters Workshop at AppSec EU ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/document/d/1PrGmwy1pxs2cb4LyewXS4TonbzAY7nORWvj-NJYaEnk/edit?hl=en_US Minutes from Workshop]&lt;br /&gt;
&lt;br /&gt;
[[AppSecEU 2011 chapters workshop agenda]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Revising the Chapter Leader Handbook ==&lt;br /&gt;
&lt;br /&gt;
We hope to make time and space available to do hands-on work revising the [[Chapter Leader Handbook]], details TBA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Questions? ==&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:sarah.baso@owasp.org Sarah Baso] or [mailto:tin.zaw@owasp.org Tin Zaw] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Global_Chapters_Committee]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_8&amp;diff=117248</id>
		<title>Global Chapter Committee - Application 8</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Chapter_Committee_-_Application_8&amp;diff=117248"/>
				<updated>2011-09-13T12:08:46Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Josh Sokol&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Austin OWASP President, LASCON Co-Chair, Austin OWASP Vice President&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Global Chapter Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Greg Genung &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Austin OWASP Membership Director, LASCON Volunteer &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh and I have worked together through the Austin OWASP chapter for the last 5 years. He has been a tremendous individual contributor to the security community - but specifically - has been a huge proponent for OWASP in Texas. He has supported each of the growing chapters in Houston, Dallas, and San Antonio - as well as his efforts in Austin with our local chapter. In addition, Josh (and James Wickett) took it upon themselves to start the LASCON conference, which in its first year was a trememdous success. Finally - Josh is reliable. When he says he is going to do something - it gets done. I reccomend Josh for this role and believe he would be a benefit to this committee.&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | David Hughes &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Austin OWASP leader, LASCON Volunteer &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh has proven his ability time and again to accomplish great things. He does what he sets out to do, and because of this he has contributed greatly to the huge success of the Austin OWASP chapter as well as the tremendous success of the LASCON conference. I highly recommend Josh and believe that his efforts on any committee would be highly valued and effective.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Mano 'dash4rk' Paul &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | CEO, SecuRisk Solutions and Express Certification; (ISC)2 Software Assurance Advisor, Speaker/Panelist in OWASP conferences &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | As President of the Austin OWASP chapter, Josh has been instrumental in building the Austin OWASP chapter to be a vibrant and active chapter. His leadership in building the local chapter is commendable and I strongly feel that his experience would be a valuable fit for the Global Chapter committee. Josh comes with my highest recommendations.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Austin&amp;amp;nbsp;OWASP Vice President and Past President, LASCON&amp;amp;nbsp;Co-Chair&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Most of the things said about Josh here are things I&amp;amp;nbsp;would have said if I&amp;amp;nbsp;were in the first few recommenders.&amp;amp;nbsp; Josh has a strong commitment to excellence, a determined will to get things done and makes people feel welcome.&amp;amp;nbsp; He has a proven track record of success and I&amp;amp;nbsp;highly recommend him for this position.&amp;amp;nbsp;&amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''10''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109983</id>
		<title>Global Conferences Committee - Application 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109983"/>
				<updated>2011-05-04T16:52:46Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Josh Sokol&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Austin OWASP President, LASCON Co-Chair, Austin OWASP Vice President&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Global Conferences Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | VP&amp;amp;nbsp;of Austin OWASP&amp;amp;nbsp;Chapter&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh is a hard worker and has led the OWASP&amp;amp;nbsp;Austin chapter for 2010 and 2011. &amp;amp;nbsp;Josh has been an instrumental part of the chapter even before that time and has served in many capacities to make OWASP&amp;amp;nbsp;successful in Austin--from communication to members to arranging food for events to speaking at meetings. &amp;amp;nbsp;I&amp;amp;nbsp;highly recommend Josh and I&amp;amp;nbsp;know that he would make a good addition to the committee. &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_6&amp;diff=105766</id>
		<title>Global Industry Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_6&amp;diff=105766"/>
				<updated>2011-02-24T22:33:15Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Nishi Kumar&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP CBT Project lead and part of OWASP Global Education Committee&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;1&amp;quot; | Global Industry Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Giorgio Fedon &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Owasp Italy TD &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi is a talented professional with specific knowledge about large corporates needs for Appsec&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Keith Turpin &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Project Leader &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi represents a large financial sector service and technology provider. She brings extensive industry knowledge and represents a customer set that can directly benefit from OWASP projects. As a industry partner she brings a user based view that will help provide a useful perspective to the committee. Combine this with her excellent technical knowledge as a system architect and she will be an asset as a committee member.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Dinis Cruz &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | [[O2 Platform]] project leader &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi is going to add a lot of value to this committee. She is a good representative to the type of Industry contact OWASP needs to reach out, and the quality of her contributions to OWASP projects (like the CTB) speak for themselves&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Anurag Agarwal &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Project Leader &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi is very dynamic and hard working. She has practical experience in handling appsec in a big company. Her experience and knowledge is crucial in OWASP's mission&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Greg Genung &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin OWASP Membership Director, LASCON Board Member, and OWASP Global&amp;amp;nbsp;Connections Committee Applicant &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi's contributions to OWASP over the last 4 years that I have known her have been large and non-trivial. She jumps right in and supports any OWASP activity with energy for the organization and passion for her trade. Nishi was a contributor to the&amp;amp;nbsp;successful OWASP LASCON in Texas. Her professionalism, leadership, and knowledge in App-Sec makes her a shoe-in for education-related activies, especially community outreach &amp;amp;amp;&amp;amp;nbsp;industry outreach.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''--''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Joe Bernik&amp;lt;span style=&amp;quot;white-space: pre;&amp;quot; class=&amp;quot;Apple-tab-span&amp;quot;&amp;gt;	&amp;lt;/span&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Former Chapter lead and Commitee member&amp;lt;span style=&amp;quot;white-space: pre;&amp;quot; class=&amp;quot;Apple-tab-span&amp;quot;&amp;gt;	&amp;lt;/span&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi Welcome to the OWASP &amp;amp;nbsp;Industry commitee and thank you for what I know will be a great contribution!&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''--''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Alexander Fry &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | GIC Member &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | In addition to the other stellar recommendations for Nishi; she works hard, does good work, and completes projects. In the GIC, we have a large number of projects to complete and I know Nishi's contributions will be appreciated.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''--''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Austin Chapter VP, LASCON Co-Founder &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi was crucial to the success of LASCON and did a wonderful job on the board.  She does a great job at whatever she puts her mind to.  Also, she is pretty dang funny and outgoing and lets be honest, that is a rarity in the security community.  I fully recommend her for this position.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Membership_Committee_-_Application_4&amp;diff=100348</id>
		<title>Global Membership Committee - Application 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Membership_Committee_-_Application_4&amp;diff=100348"/>
				<updated>2011-01-13T22:36:34Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Greg Genung&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin OWASP Membership Director.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Membership Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Josh&amp;amp;nbsp;Sokol &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin OWASP&amp;amp;nbsp;President &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Greg has served as our Austin&amp;amp;nbsp;OWASP Membership Director for the past year and has been instrumental in raising our membership levels and awareness of OWASP&amp;amp;nbsp;in the community.&amp;amp;nbsp; Under his leadership we went from under a dozen members in the Austin chapter to almost a hundred.&amp;amp;nbsp; He is always coming up with new ideas and ways to drive people to our chapter and help to evangelize security within our community.&amp;amp;nbsp; It would be very selfish of us to want to keep his amazing ideas just to our chapter so it is with great pleasure that I'd like to recommend Greg's nomination to the OWASP&amp;amp;nbsp;Global Membership Committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin Chapter Vice President&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | I&amp;amp;nbsp;recommend Greg for the committee. There are a lot of things I could say about Greg but the easiest is to say that I&amp;amp;nbsp;echo Josh 100%.&amp;amp;nbsp; One thing I&amp;amp;nbsp;would add is that Greg was instrumental to the success of LASCON.&amp;amp;nbsp; In addition to working on the board, Greg was the face of the conference as the leader for speaker introductions and really helped keep the conference running smoothly.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99713</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99713"/>
				<updated>2011-01-11T00:05:02Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* 2011 Conferences and events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers and practitioners to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
Check out OWASP's conferences for the past two years on [http://maps.google.com/maps/ms?hl=en&amp;amp;gl=us&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=102471112605576686928.00046255c51af35309c77 Google Maps].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2011 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
|[[Summit_2011|OWASP Summit 2011]]&lt;br /&gt;
| February  8th - February 11th&lt;br /&gt;
| Lisbon (Torres Vedras), Portugal&lt;br /&gt;
| Entire Board, Commitee Members&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec North America&lt;br /&gt;
| September 19th - September 23rd&lt;br /&gt;
| Minneapolis, MN, USA&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec Europe&lt;br /&gt;
| June (TBC)&lt;br /&gt;
| TBC&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec South America &lt;br /&gt;
| October 11 - 14th 2011&lt;br /&gt;
| Porto Alegre, Brazil&lt;br /&gt;
| TBD&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2011 Conferences and events ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2011 LASCON]&lt;br /&gt;
| October 28th, 2011&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==2010 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
Local chapters can plan half or full-day events in their region, please [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Contact Us] for support getting your event organized.&lt;br /&gt;
&lt;br /&gt;
For information on planning an official OWASP Foundation AppSec conferences with sponsors, please refer to [[How_to_Host_a_Conference]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Call for 2011 Conferences is now open.&amp;lt;/b&amp;gt;  Planning a great event takes time, so if you wish to host a conference in 2011 please submit a proposal detailing the venue and a detailed budget to the [http://www.owasp.org/index.php/Global_Conferences_Committee Global Conferences Committee].  The 2011 schedule is filling up quickly, so get started right away!  OWASP Board members will be [http://www.owasp.org/index.php/How_to_Host_a_Conference#tab=BOARD_MEMBER_ROLE participating]in OWASP events as listed below.  &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/AppSec_Brasil_2010#tab=About AppSec Brazil]&lt;br /&gt;
| November 16th - November 19th&lt;br /&gt;
| Campinas, SP, Brazil&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 AppSec DC 2010]&lt;br /&gt;
| November 8th - November 11th&lt;br /&gt;
| Washington, DC&lt;br /&gt;
| U.S. Board Members&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/2010_BASC_Homepage Boston Application Security Conference 2010]&lt;br /&gt;
| November 20th&lt;br /&gt;
| Cambridge, MA&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/IBWAS10 IBWAS]&lt;br /&gt;
| November 25th - November 26th&lt;br /&gt;
| Portugal&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| [[BeNeLux OWASP Day 2010]]&lt;br /&gt;
| December 1st - 2nd&lt;br /&gt;
| Eindhoven, The Netherlands&lt;br /&gt;
| Seba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2010 Conferences and events - Completed ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_AppSec_Research_2010_-_Stockholm,_Sweden|OWASP AppSec Research 2010]] &lt;br /&gt;
| June 21st - June 24th&lt;br /&gt;
| Stockholm, Sweden&lt;br /&gt;
| Dave Wichers, Tom Brennan, Seba&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Froc 2010] &lt;br /&gt;
| June 2nd&lt;br /&gt;
| Denver, Colorodo, USA&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_Day_Mexico_2010 | OWASP Day Mexico (at Aguascalientes)]]&lt;br /&gt;
| June 4th&lt;br /&gt;
|  Aguascalientes, Mexico&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_Day_Argentina_2010 OWASP Day, Argentina 2010]&lt;br /&gt;
|June 30&lt;br /&gt;
|Buenos Aries&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 New Zealand Day]&lt;br /&gt;
| July 15th&lt;br /&gt;
| Auckland, New Zealand&lt;br /&gt;
|-&lt;br /&gt;
| [[AppSec US 2010, CA]]&lt;br /&gt;
| September 7th - September 10th&lt;br /&gt;
| Irvine, CA&lt;br /&gt;
| Jeff Williams, Tom Brennan, Dave Wichers&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_IRELAND_2010 AppSec Ireland 2010]&lt;br /&gt;
| September 17th&lt;br /&gt;
| Dublin, Ireland&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP AppSec Germany 2010 Conference]]&lt;br /&gt;
| October 20th&lt;br /&gt;
| Nürnberg, Germany&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://rochestersecurity.org Rochester Security Summit]&lt;br /&gt;
| October 20th -October 21st&lt;br /&gt;
| Rocheter, NY, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010]&lt;br /&gt;
| October 20th -October 23rd&lt;br /&gt;
| Beijing, China&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON]&lt;br /&gt;
| October 29th, 2010&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2009 Conferences and Events==&lt;br /&gt;
&lt;br /&gt;
; November 4th 2009 - [[Italy OWASP Day 4]] &lt;br /&gt;
&lt;br /&gt;
; November 11th 2009 - [http://www.owasp.org/index.php/Summit_2009 OWASP Global Summit 2009] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 10th-13th 2009 - [[OWASP_AppSec_US_2009_-_Washington_DC |OWASP AppSec US 2009]] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 17-20, 2009 - [http://www.owasp.org/index.php/Category:India App Sec India]&lt;br /&gt;
&lt;br /&gt;
; December 2nd 2009 - [[BeNeLux_OWASP_Day_2009|BeNeLux Day]]&lt;br /&gt;
&lt;br /&gt;
; December 10-11, 2009 - [[OWASP AppSec Iberia 2009|IBWAS'09 - Iberic Web Application Security Conference (Spain and Portugal)]] - Madrid, Spain&lt;br /&gt;
&lt;br /&gt;
; October 13, 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference#tab=Anmeldung_und_Preise German Conference]&lt;br /&gt;
&lt;br /&gt;
; October 27-30 2009 - [[AppSec_CPLP_2009 |OWASP AppSec Brazil 2009]]&lt;br /&gt;
:  Conference and tutorials at Câmara dos Deputados, Anexo II, Praça dos Três Poderes&lt;br /&gt;
&lt;br /&gt;
; October 28-29 2009 - [http://rochestersecurity.org/ 4th annual Rochester Security Summit]&lt;br /&gt;
&lt;br /&gt;
; September 10, 2009 - [[OWASP_Ireland_AppSec_2009_Conference|OWASP AppSec Ireland 09]]&lt;br /&gt;
&lt;br /&gt;
; August 26, 2009 - [[AppSec_Academia_Symposium|AppSec Academia Symposium]]&lt;br /&gt;
&lt;br /&gt;
; August 24, 2009 [[OWASP_Minneapolis_St_Paul_2009_Conference| Minneapolis/St Paul half day event]]&lt;br /&gt;
&lt;br /&gt;
; July 2009 - [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]] - New Zealand&lt;br /&gt;
: July 13th - 2 track conference, University of Auckland, Auckland, New Zealand (Registrations are Open)&lt;br /&gt;
&lt;br /&gt;
; May 2009 - [[OWASP_AppSec_Europe_2009_-_Poland |OWASP AppSec Europe 2009]] - Poland&lt;br /&gt;
: May 11th-14th - 3 track conference and 8 tutorials, Park In Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[OWASP_Software_Assurance_Day_DC_2009|OWASP Software Assurance Day DC 2009 (in conjunction with the DHS/DOD/NIST Software Assurance Forum)]]&lt;br /&gt;
: March 13th, 1-Day Conference in McLean, Virginia&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[Front_Range_OWASP_Conference_2009|Front Range OWASP Conference 2009 (aka SNOWFroc)]]&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[OWASP_AU_Conference_2009|OWASP AppSec Australia 2009]] - Gold Coast&lt;br /&gt;
: Feb 25th-27th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[Italy_OWASP_Day_3 |Day 3 Italy]]&lt;br /&gt;
: Feb 23rd - OWASP Day III: &amp;quot;Web Application Security: research meets industry&amp;quot; - Bari (Italy)&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Park Central Hotel, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [[Front_Range_Web_Application_Security_Summit_Planning_Page | Front Range Web Application Security Conference]] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
=== 2007 ===&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[OWASP_AppSec_Europe_2007_-_Italy | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[OWASP_AppSec_Europe_2007_-_Italy/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
=== 2004-2006 ===&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
More [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference-archive Conference Archives - Click Here]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99712</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99712"/>
				<updated>2011-01-10T23:50:05Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* 2011 Conferences and events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers and practitioners to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
Check out OWASP's conferences for the past two years on [http://maps.google.com/maps/ms?hl=en&amp;amp;gl=us&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=102471112605576686928.00046255c51af35309c77 Google Maps].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2011 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
|[[Summit_2011|OWASP Summit 2011]]&lt;br /&gt;
| February  8th - February 11th&lt;br /&gt;
| Lisbon (Torres Vedras), Portugal&lt;br /&gt;
| Entire Board, Commitee Members&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec North America&lt;br /&gt;
| September 19th - September 23rd&lt;br /&gt;
| Minneapolis, MN, USA&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec Europe&lt;br /&gt;
| June (TBC)&lt;br /&gt;
| TBC&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec South America &lt;br /&gt;
| October 11 - 14th 2011&lt;br /&gt;
| Porto Alegre, Brazil&lt;br /&gt;
| TBD&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2011 Conferences and events ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2011 LASCON]&lt;br /&gt;
| October 28th, 2011&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==2010 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
Local chapters can plan half or full-day events in their region, please [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Contact Us] for support getting your event organized.&lt;br /&gt;
&lt;br /&gt;
For information on planning an official OWASP Foundation AppSec conferences with sponsors, please refer to [[How_to_Host_a_Conference]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Call for 2011 Conferences is now open.&amp;lt;/b&amp;gt;  Planning a great event takes time, so if you wish to host a conference in 2011 please submit a proposal detailing the venue and a detailed budget to the [http://www.owasp.org/index.php/Global_Conferences_Committee Global Conferences Committee].  The 2011 schedule is filling up quickly, so get started right away!  OWASP Board members will be [http://www.owasp.org/index.php/How_to_Host_a_Conference#tab=BOARD_MEMBER_ROLE participating]in OWASP events as listed below.  &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/AppSec_Brasil_2010#tab=About AppSec Brazil]&lt;br /&gt;
| November 16th - November 19th&lt;br /&gt;
| Campinas, SP, Brazil&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 AppSec DC 2010]&lt;br /&gt;
| November 8th - November 11th&lt;br /&gt;
| Washington, DC&lt;br /&gt;
| U.S. Board Members&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/2010_BASC_Homepage Boston Application Security Conference 2010]&lt;br /&gt;
| November 20th&lt;br /&gt;
| Cambridge, MA&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/IBWAS10 IBWAS]&lt;br /&gt;
| November 25th - November 26th&lt;br /&gt;
| Portugal&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| [[BeNeLux OWASP Day 2010]]&lt;br /&gt;
| December 1st - 2nd&lt;br /&gt;
| Eindhoven, The Netherlands&lt;br /&gt;
| Seba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2010 Conferences and events - Completed ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_AppSec_Research_2010_-_Stockholm,_Sweden|OWASP AppSec Research 2010]] &lt;br /&gt;
| June 21st - June 24th&lt;br /&gt;
| Stockholm, Sweden&lt;br /&gt;
| Dave Wichers, Tom Brennan, Seba&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Froc 2010] &lt;br /&gt;
| June 2nd&lt;br /&gt;
| Denver, Colorodo, USA&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_Day_Mexico_2010 | OWASP Day Mexico (at Aguascalientes)]]&lt;br /&gt;
| June 4th&lt;br /&gt;
|  Aguascalientes, Mexico&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_Day_Argentina_2010 OWASP Day, Argentina 2010]&lt;br /&gt;
|June 30&lt;br /&gt;
|Buenos Aries&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 New Zealand Day]&lt;br /&gt;
| July 15th&lt;br /&gt;
| Auckland, New Zealand&lt;br /&gt;
|-&lt;br /&gt;
| [[AppSec US 2010, CA]]&lt;br /&gt;
| September 7th - September 10th&lt;br /&gt;
| Irvine, CA&lt;br /&gt;
| Jeff Williams, Tom Brennan, Dave Wichers&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_IRELAND_2010 AppSec Ireland 2010]&lt;br /&gt;
| September 17th&lt;br /&gt;
| Dublin, Ireland&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP AppSec Germany 2010 Conference]]&lt;br /&gt;
| October 20th&lt;br /&gt;
| Nürnberg, Germany&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://rochestersecurity.org Rochester Security Summit]&lt;br /&gt;
| October 20th -October 21st&lt;br /&gt;
| Rocheter, NY, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010]&lt;br /&gt;
| October 20th -October 23rd&lt;br /&gt;
| Beijing, China&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON]&lt;br /&gt;
| October 29th, 2010&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2009 Conferences and Events==&lt;br /&gt;
&lt;br /&gt;
; November 4th 2009 - [[Italy OWASP Day 4]] &lt;br /&gt;
&lt;br /&gt;
; November 11th 2009 - [http://www.owasp.org/index.php/Summit_2009 OWASP Global Summit 2009] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 10th-13th 2009 - [[OWASP_AppSec_US_2009_-_Washington_DC |OWASP AppSec US 2009]] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 17-20, 2009 - [http://www.owasp.org/index.php/Category:India App Sec India]&lt;br /&gt;
&lt;br /&gt;
; December 2nd 2009 - [[BeNeLux_OWASP_Day_2009|BeNeLux Day]]&lt;br /&gt;
&lt;br /&gt;
; December 10-11, 2009 - [[OWASP AppSec Iberia 2009|IBWAS'09 - Iberic Web Application Security Conference (Spain and Portugal)]] - Madrid, Spain&lt;br /&gt;
&lt;br /&gt;
; October 13, 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference#tab=Anmeldung_und_Preise German Conference]&lt;br /&gt;
&lt;br /&gt;
; October 27-30 2009 - [[AppSec_CPLP_2009 |OWASP AppSec Brazil 2009]]&lt;br /&gt;
:  Conference and tutorials at Câmara dos Deputados, Anexo II, Praça dos Três Poderes&lt;br /&gt;
&lt;br /&gt;
; October 28-29 2009 - [http://rochestersecurity.org/ 4th annual Rochester Security Summit]&lt;br /&gt;
&lt;br /&gt;
; September 10, 2009 - [[OWASP_Ireland_AppSec_2009_Conference|OWASP AppSec Ireland 09]]&lt;br /&gt;
&lt;br /&gt;
; August 26, 2009 - [[AppSec_Academia_Symposium|AppSec Academia Symposium]]&lt;br /&gt;
&lt;br /&gt;
; August 24, 2009 [[OWASP_Minneapolis_St_Paul_2009_Conference| Minneapolis/St Paul half day event]]&lt;br /&gt;
&lt;br /&gt;
; July 2009 - [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]] - New Zealand&lt;br /&gt;
: July 13th - 2 track conference, University of Auckland, Auckland, New Zealand (Registrations are Open)&lt;br /&gt;
&lt;br /&gt;
; May 2009 - [[OWASP_AppSec_Europe_2009_-_Poland |OWASP AppSec Europe 2009]] - Poland&lt;br /&gt;
: May 11th-14th - 3 track conference and 8 tutorials, Park In Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[OWASP_Software_Assurance_Day_DC_2009|OWASP Software Assurance Day DC 2009 (in conjunction with the DHS/DOD/NIST Software Assurance Forum)]]&lt;br /&gt;
: March 13th, 1-Day Conference in McLean, Virginia&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[Front_Range_OWASP_Conference_2009|Front Range OWASP Conference 2009 (aka SNOWFroc)]]&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[OWASP_AU_Conference_2009|OWASP AppSec Australia 2009]] - Gold Coast&lt;br /&gt;
: Feb 25th-27th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[Italy_OWASP_Day_3 |Day 3 Italy]]&lt;br /&gt;
: Feb 23rd - OWASP Day III: &amp;quot;Web Application Security: research meets industry&amp;quot; - Bari (Italy)&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Park Central Hotel, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [[Front_Range_Web_Application_Security_Summit_Planning_Page | Front Range Web Application Security Conference]] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
=== 2007 ===&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[OWASP_AppSec_Europe_2007_-_Italy | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[OWASP_AppSec_Europe_2007_-_Italy/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
=== 2004-2006 ===&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
More [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference-archive Conference Archives - Click Here]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99711</id>
		<title>Category:OWASP AppSec Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_AppSec_Conference&amp;diff=99711"/>
				<updated>2011-01-10T23:49:39Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The OWASP AppSec conference series is dedicated to bringing together industry, government, and security researchers and practitioners to discuss the state of the art in application security. This series was launched in the U.S. in the Fall of 2004 and in Europe in the Spring of 2005 and this has rapidly grown into a world wide phenomenon which now includes the U.S., Europe, Asia, Australia, and Israel. All of the presentations from our previous conferences can be downloaded from the agenda pages for each conference.&lt;br /&gt;
&lt;br /&gt;
Check out OWASP's conferences for the past two years on [http://maps.google.com/maps/ms?hl=en&amp;amp;gl=us&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=102471112605576686928.00046255c51af35309c77 Google Maps].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2011 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
|[[Summit_2011|OWASP Summit 2011]]&lt;br /&gt;
| February  8th - February 11th&lt;br /&gt;
| Lisbon (Torres Vedras), Portugal&lt;br /&gt;
| Entire Board, Commitee Members&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec North America&lt;br /&gt;
| September 19th - September 23rd&lt;br /&gt;
| Minneapolis, MN, USA&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec Europe&lt;br /&gt;
| June (TBC)&lt;br /&gt;
| TBC&lt;br /&gt;
| Entire Board&lt;br /&gt;
|-&lt;br /&gt;
| Global AppSec South America &lt;br /&gt;
| October 11 - 14th 2011&lt;br /&gt;
| Porto Alegre, Brazil&lt;br /&gt;
| TBD&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2011 Conferences and events ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2011 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON]&lt;br /&gt;
| October 28th, 2011&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==2010 Conferences Schedule==&lt;br /&gt;
&lt;br /&gt;
Local chapters can plan half or full-day events in their region, please [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Contact Us] for support getting your event organized.&lt;br /&gt;
&lt;br /&gt;
For information on planning an official OWASP Foundation AppSec conferences with sponsors, please refer to [[How_to_Host_a_Conference]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Call for 2011 Conferences is now open.&amp;lt;/b&amp;gt;  Planning a great event takes time, so if you wish to host a conference in 2011 please submit a proposal detailing the venue and a detailed budget to the [http://www.owasp.org/index.php/Global_Conferences_Committee Global Conferences Committee].  The 2011 schedule is filling up quickly, so get started right away!  OWASP Board members will be [http://www.owasp.org/index.php/How_to_Host_a_Conference#tab=BOARD_MEMBER_ROLE participating]in OWASP events as listed below.  &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 GLOBAL APPSEC EVENTS&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction/Keynote&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/AppSec_Brasil_2010#tab=About AppSec Brazil]&lt;br /&gt;
| November 16th - November 19th&lt;br /&gt;
| Campinas, SP, Brazil&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 AppSec DC 2010]&lt;br /&gt;
| November 8th - November 11th&lt;br /&gt;
| Washington, DC&lt;br /&gt;
| U.S. Board Members&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/2010_BASC_Homepage Boston Application Security Conference 2010]&lt;br /&gt;
| November 20th&lt;br /&gt;
| Cambridge, MA&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/IBWAS10 IBWAS]&lt;br /&gt;
| November 25th - November 26th&lt;br /&gt;
| Portugal&lt;br /&gt;
| Dinis Cruz&lt;br /&gt;
|-&lt;br /&gt;
| [[BeNeLux OWASP Day 2010]]&lt;br /&gt;
| December 1st - 2nd&lt;br /&gt;
| Eindhoven, The Netherlands&lt;br /&gt;
| Seba&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2010 Conferences and events - Completed ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! 2010 Regional And Local Events&lt;br /&gt;
! DATE&lt;br /&gt;
! LOCATION&lt;br /&gt;
! OWASP Introduction&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_AppSec_Research_2010_-_Stockholm,_Sweden|OWASP AppSec Research 2010]] &lt;br /&gt;
| June 21st - June 24th&lt;br /&gt;
| Stockholm, Sweden&lt;br /&gt;
| Dave Wichers, Tom Brennan, Seba&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Froc 2010] &lt;br /&gt;
| June 2nd&lt;br /&gt;
| Denver, Colorodo, USA&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP_Day_Mexico_2010 | OWASP Day Mexico (at Aguascalientes)]]&lt;br /&gt;
| June 4th&lt;br /&gt;
|  Aguascalientes, Mexico&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_Day_Argentina_2010 OWASP Day, Argentina 2010]&lt;br /&gt;
|June 30&lt;br /&gt;
|Buenos Aries&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_New_Zealand_Day_2010 New Zealand Day]&lt;br /&gt;
| July 15th&lt;br /&gt;
| Auckland, New Zealand&lt;br /&gt;
|-&lt;br /&gt;
| [[AppSec US 2010, CA]]&lt;br /&gt;
| September 7th - September 10th&lt;br /&gt;
| Irvine, CA&lt;br /&gt;
| Jeff Williams, Tom Brennan, Dave Wichers&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.owasp.org/index.php/OWASP_IRELAND_2010 AppSec Ireland 2010]&lt;br /&gt;
| September 17th&lt;br /&gt;
| Dublin, Ireland&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
|-&lt;br /&gt;
| [[OWASP AppSec Germany 2010 Conference]]&lt;br /&gt;
| October 20th&lt;br /&gt;
| Nürnberg, Germany&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://rochestersecurity.org Rochester Security Summit]&lt;br /&gt;
| October 20th -October 21st&lt;br /&gt;
| Rocheter, NY, USA&lt;br /&gt;
| TBD&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_China_Summit_2010 OWASP China Summit 2010]&lt;br /&gt;
| October 20th -October 23rd&lt;br /&gt;
| Beijing, China&lt;br /&gt;
| Tom Brennan&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON]&lt;br /&gt;
| October 29th, 2010&lt;br /&gt;
| Austin, TX, USA&lt;br /&gt;
| Matt Tesauro&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== 2009 Conferences and Events==&lt;br /&gt;
&lt;br /&gt;
; November 4th 2009 - [[Italy OWASP Day 4]] &lt;br /&gt;
&lt;br /&gt;
; November 11th 2009 - [http://www.owasp.org/index.php/Summit_2009 OWASP Global Summit 2009] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 10th-13th 2009 - [[OWASP_AppSec_US_2009_-_Washington_DC |OWASP AppSec US 2009]] - Washington, D.C.&lt;br /&gt;
&lt;br /&gt;
; November 17-20, 2009 - [http://www.owasp.org/index.php/Category:India App Sec India]&lt;br /&gt;
&lt;br /&gt;
; December 2nd 2009 - [[BeNeLux_OWASP_Day_2009|BeNeLux Day]]&lt;br /&gt;
&lt;br /&gt;
; December 10-11, 2009 - [[OWASP AppSec Iberia 2009|IBWAS'09 - Iberic Web Application Security Conference (Spain and Portugal)]] - Madrid, Spain&lt;br /&gt;
&lt;br /&gt;
; October 13, 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference#tab=Anmeldung_und_Preise German Conference]&lt;br /&gt;
&lt;br /&gt;
; October 27-30 2009 - [[AppSec_CPLP_2009 |OWASP AppSec Brazil 2009]]&lt;br /&gt;
:  Conference and tutorials at Câmara dos Deputados, Anexo II, Praça dos Três Poderes&lt;br /&gt;
&lt;br /&gt;
; October 28-29 2009 - [http://rochestersecurity.org/ 4th annual Rochester Security Summit]&lt;br /&gt;
&lt;br /&gt;
; September 10, 2009 - [[OWASP_Ireland_AppSec_2009_Conference|OWASP AppSec Ireland 09]]&lt;br /&gt;
&lt;br /&gt;
; August 26, 2009 - [[AppSec_Academia_Symposium|AppSec Academia Symposium]]&lt;br /&gt;
&lt;br /&gt;
; August 24, 2009 [[OWASP_Minneapolis_St_Paul_2009_Conference| Minneapolis/St Paul half day event]]&lt;br /&gt;
&lt;br /&gt;
; July 2009 - [[OWASP_New_Zealand_Day_2009|OWASP New Zealand Day 2009]] - New Zealand&lt;br /&gt;
: July 13th - 2 track conference, University of Auckland, Auckland, New Zealand (Registrations are Open)&lt;br /&gt;
&lt;br /&gt;
; May 2009 - [[OWASP_AppSec_Europe_2009_-_Poland |OWASP AppSec Europe 2009]] - Poland&lt;br /&gt;
: May 11th-14th - 3 track conference and 8 tutorials, Park In Hotel, Krakow, Poland&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[OWASP_Software_Assurance_Day_DC_2009|OWASP Software Assurance Day DC 2009 (in conjunction with the DHS/DOD/NIST Software Assurance Forum)]]&lt;br /&gt;
: March 13th, 1-Day Conference in McLean, Virginia&lt;br /&gt;
&lt;br /&gt;
; March 2009 - [[Front_Range_OWASP_Conference_2009|Front Range OWASP Conference 2009 (aka SNOWFroc)]]&lt;br /&gt;
: March 5th, 2nd Annual 1-Day Conference in Denver, Colorado&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[OWASP_AU_Conference_2009|OWASP AppSec Australia 2009]] - Gold Coast&lt;br /&gt;
: Feb 25th-27th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
; February 2009 - [[Italy_OWASP_Day_3 |Day 3 Italy]]&lt;br /&gt;
: Feb 23rd - OWASP Day III: &amp;quot;Web Application Security: research meets industry&amp;quot; - Bari (Italy)&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
; November 2008 - [[OWASP_Germany_2008_Conference | OWASP Germany Conference]]&lt;br /&gt;
: November 25th - 1-Day Conference in Frankfurt, Germany&lt;br /&gt;
&lt;br /&gt;
; November 2008 - [[OWASP_EU_Summit_2008 | OWASP Summit 2008 - Portugal]]&lt;br /&gt;
: November 3rd - 7th - Working Sessions, Conference &amp;amp; Training, Algarve, Portugal&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP AppSec Asia 2008 - Taiwan]]&lt;br /&gt;
: October 27th - 28th - NTUH International Convention Centre, Taipei, Taiwan&lt;br /&gt;
&lt;br /&gt;
; October 2008 - [[OWASP_Minneapolis_St_Paul_2008_Conference | OWASP Minnesota Conference]]&lt;br /&gt;
: October 21st - University of Minnesota's St. Paul Student Center&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_NYC_AppSec_2008_Conference | OWASP AppSec U.S. 2008 - New York City]]&lt;br /&gt;
: September 22nd - 25th - Conference &amp;amp; Training, Park Central Hotel, NYC&lt;br /&gt;
&lt;br /&gt;
; September 2008 - [[OWASP_Israel_2008_Conference | OWASP Israel 2008 - Herzliya, Israel]]&lt;br /&gt;
: September 14th - The Interdisciplinary Center Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; August 2008 - [[OWASP_AppSec_India_Conference_2008 | OWASP AppSec India 2008 - Delhi, India]]&lt;br /&gt;
: August 20th - 21st - Conference &amp;amp; Training&lt;br /&gt;
&lt;br /&gt;
; June 10th 2008 - [[Front_Range_Web_Application_Security_Summit_Planning_Page | Front Range Web Application Security Conference]] - Denver, CO&lt;br /&gt;
&lt;br /&gt;
; May 2008 - [[OWASP_AppSec_Europe_2008_-_Belgium | OWASP AppSec Europe 2008 - Ghent, Belgium]]&lt;br /&gt;
: May 19th - 22nd - Conference &amp;amp; Training, Ghent University, Belgium (view [[OWASP_AppSec_Europe_2008_-_Belgium#Agenda_and_Presentations_-_May_21-22|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; February 2008 - [[OWASP_Australia_AppSec_2008_Conference | OWASP Australia AppSec 2008 Conference]] &lt;br /&gt;
: February 27th-29th - Training &amp;amp; Conference, Gold Coast Convention Center, QLD Australia&lt;br /&gt;
&lt;br /&gt;
=== 2007 ===&lt;br /&gt;
; December 2007 - [[OWASP_Israel_2007_Conference | OWASP Israel AppSec 2007 Conference]]&lt;br /&gt;
: December 3rd, 2007 - Interdisciplinary Center (IDC) Herzliya, Israel&lt;br /&gt;
&lt;br /&gt;
; November 2007 - [[OWASP &amp;amp; WASC AppSec 2007 Conference | OWASP &amp;amp; WASC AppSec U.S. 2007 - San Jose, California]]&lt;br /&gt;
: November 12-15 - at eBay in San Jose, CA. (view [[7th_OWASP_AppSec_Conference_-_San_Jose_2007/Agenda#OWASP_.26_WASC_AppSec_2007_Conference_Schedule_-_Nov_14-15_.28San_Jose_2007.29|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; September 2007 - [[OWASP_AppSec_Asia_2007 | OWASP AppSec Asia 2007 - Taiwan]]&lt;br /&gt;
: September 27 - in Taipei, Taiwan. &lt;br /&gt;
&lt;br /&gt;
; May 2007 - [[OWASP_AppSec_Europe_2007_-_Italy | OWASP AppSec Europe 2007 - Italy]]&lt;br /&gt;
: May 15th-17th - in Milan, Italy. (view [[OWASP_AppSec_Europe_2007_-_Italy/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
=== 2004-2006 ===&lt;br /&gt;
&lt;br /&gt;
; October 2006 - [[OWASP AppSec Seattle 2006| OWASP AppSec U.S. 2006 - Seattle, Washington]]&lt;br /&gt;
: October 16th-18th - in Seattle, Washington. (view [[OWASP_AppSec_Seattle_2006/Agenda|agenda and presentations]]) &lt;br /&gt;
&lt;br /&gt;
; May 2006 - [[OWASP AppSec Europe 2006| OWASP AppSec Europe 2006 - Belgium ]]&lt;br /&gt;
: Held in Leuven, Belgium (view [[AppSec Europe 2006/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; October 2005 - [[OWASP AppSec Washington 2005|OWASP AppSec U.S. 2005 - Washington D.C.]]&lt;br /&gt;
: Held at NIST in Gaithersburg, MD (view [[AppSec Washington 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; April 2005 - [[OWASP AppSec Europe 2005|OWASP AppSec Europe 2005 - London]]&lt;br /&gt;
: Held at Royal Holloway University in London (view [[AppSec Europe 2005/Agenda|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
; November 2004 - [[OWASP AppSec NYC 2004|OWASP AppSec U.S. 2004 - New York City]]&lt;br /&gt;
: Held at Stevens Institute in New Jersey (view [[AppSec NYC 2004|agenda and presentations]])&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
More [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference-archive Conference Archives - Click Here]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=91349</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=91349"/>
				<updated>2010-10-13T15:36:25Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* Registration Is Now Open! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Speaker List Posted! | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the CFP has ended for LASCON 2010.  Maybe next year?'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members (Includes a 1 year OWASP membership)&lt;br /&gt;
| $150 Until 10/26/2010 &lt;br /&gt;
| $200 After 10/26/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $100 Until 10/26/2010 &lt;br /&gt;
| $150 After 10/26/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID (must be shown at the door) &lt;br /&gt;
| $80 Until 10/26/2010 &lt;br /&gt;
| $130 After 10/26/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Embassy Suites in the Arboretum and you can book rooms at using the discount code: LAS at 1-800-362-2779 or you can &lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online.]&lt;br /&gt;
&lt;br /&gt;
Embassy Suites Austin - Arboretum&lt;br /&gt;
9505 Stonelake Boulevard&lt;br /&gt;
Austin, Texas &lt;br /&gt;
78759&lt;br /&gt;
 &lt;br /&gt;
The rooms are $139 for a double or queen, includes hot breakfast and shuttle to/from the event.&lt;br /&gt;
&lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online with the LASCON discount.]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
| [[Image:Denim-group.png|150px|link=http://www.denimgroup.com]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Options  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=90425</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=90425"/>
				<updated>2010-09-30T19:28:04Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* Silver Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Speaker List Posted! | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the CFP has ended for LASCON 2010.  Maybe next year?'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members (Includes a 1 year OWASP membership)&lt;br /&gt;
| $100 Until 9/24/2010 &lt;br /&gt;
| $150 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/24/2010 &lt;br /&gt;
| $100 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID (must be shown at the door) &lt;br /&gt;
| $30 Until 9/24/2010 &lt;br /&gt;
| $50 After 9/24/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Embassy Suites in the Arboretum and you can book rooms at using the discount code: LAS at 1-800-362-2779 or you can &lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online.]&lt;br /&gt;
&lt;br /&gt;
Embassy Suites Austin - Arboretum&lt;br /&gt;
9505 Stonelake Boulevard&lt;br /&gt;
Austin, Texas &lt;br /&gt;
78759&lt;br /&gt;
 &lt;br /&gt;
The rooms are $139 for a double or queen, includes hot breakfast and shuttle to/from the event.&lt;br /&gt;
&lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online with the LASCON discount.]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
| [[Image:Denim-group.png|150px|link=http://www.denimgroup.com]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Options  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Denim-group.png&amp;diff=90424</id>
		<title>File:Denim-group.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Denim-group.png&amp;diff=90424"/>
				<updated>2010-09-30T19:26:58Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89276</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89276"/>
				<updated>2010-09-14T15:57:22Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Speaker List Posted! | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the CFP has ended for LASCON 2010.  Maybe next year?'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members (Includes a 1 year OWASP membership)&lt;br /&gt;
| $100 Until 9/24/2010 &lt;br /&gt;
| $150 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/24/2010 &lt;br /&gt;
| $100 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID (must be shown at the door) &lt;br /&gt;
| $30 Until 9/24/2010 &lt;br /&gt;
| $50 After 9/24/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Embassy Suites in the Arboretum and you can book rooms at using the discount code: LAS at 1-800-362-2779 or you can &lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online.]&lt;br /&gt;
&lt;br /&gt;
Embassy Suites Austin - Arboretum&lt;br /&gt;
9505 Stonelake Boulevard&lt;br /&gt;
Austin, Texas &lt;br /&gt;
78759&lt;br /&gt;
 &lt;br /&gt;
The rooms are $139 for a double or queen, includes hot breakfast and shuttle to/from the event.&lt;br /&gt;
&lt;br /&gt;
[http://embassysuites.hilton.com/en/es/groups/personalized/AUSESES-LAS-20101025/index.jhtml?WT.mc_id=POG Book your room online with the LASCON discount.]&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Options  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89264</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89264"/>
				<updated>2010-09-14T14:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Bummer dude, the Call For Papers is over, but the speaker list is coming soon | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the CFP has ended for LASCON 2010.  Maybe next year?'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members (Includes a 1 year OWASP membership)&lt;br /&gt;
| $100 Until 9/24/2010 &lt;br /&gt;
| $150 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/24/2010 &lt;br /&gt;
| $100 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID (must be shown at the door) &lt;br /&gt;
| $30 Until 9/24/2010 &lt;br /&gt;
| $50 After 9/24/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Embassy Suites in the Arboretum and will have a discount code and link for registration shortly.  &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Options  ====&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89262</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=89262"/>
				<updated>2010-09-14T14:16:26Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Bummer dude, the Call For Papers is over, but the speaker list is coming soon | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:LACON2010Schedule.png|800px|link=http://www.lascon.org|LASCON 2010 Schedule]]&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
'''Sorry, the CFP has ended for LASCON 2010.  Maybe next year?'''&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members (Includes a 1 year OWASP membership)&lt;br /&gt;
| $100 Until 9/24/2010 &lt;br /&gt;
| $150 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/24/2010 &lt;br /&gt;
| $100 After 9/24/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID (must be shown at the door) &lt;br /&gt;
| $30 Until 9/24/2010 &lt;br /&gt;
| $50 After 9/24/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)owasp.org to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Room Monitors&lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Registration&lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
We have partnered with the Embassy Suites in the Arboretum and will have a discount code and link for registration shortly.  &lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88502</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88502"/>
				<updated>2010-09-01T19:48:10Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | Bummer dude, the Call For Papers is over, but the speaker list is coming soon | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88501</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88501"/>
				<updated>2010-09-01T19:46:52Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | [http://www.easychair.org/conferences/?conf=lascon2010 Hey Speakers! Submit Proposals Here] | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/d/vdqf7g/4W You can register for the conference here]''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88479</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=88479"/>
				<updated>2010-09-01T14:32:56Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Registration Link] | [http://www.easychair.org/conferences/?conf=lascon2010 Hey Speakers! Submit Proposals Here] | [http://twitter.com/LASCONATX Follow LASCONATX on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Is Now Open!  ==&lt;br /&gt;
&lt;br /&gt;
[http://guest.cvent.com/d/vdqf7g/4W Register Here]&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| '''YOUR COMPANY NAME AND LOGO COULD BE HERE'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
| [[Image:Whitehat.jpg|274px|link=http://www.whitehatsec.com]]&lt;br /&gt;
| [[Image:Splunk.jpg|link=http://www.splunk.com]]&lt;br /&gt;
| [[Image:Impactsecurityllc.png|link=http://www.impactsecurityllc.net]]&amp;lt;br&amp;gt;'''Impact Security LLC'''&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:K2share.gif|150px|link=http://www.k2share.com]]&lt;br /&gt;
| [[Image:Dexa.jpg|150px|link=http://www.dexasystems.com]]&lt;br /&gt;
| [[Image:Expandingsecurity.jpg|150px|link=http://www.expandingsecurity.com]]&amp;lt;br&amp;gt;'''Expanding Security'''&lt;br /&gt;
| [[Image:Trustwave.jpg|150px|link=http://www.trustwave.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; [[Image:Fortify.png|150px|link=http://www.fortify.com]]&lt;br /&gt;
| [[Image:Veracode.gif|150px|link=http://www.veracode.com]]&lt;br /&gt;
| [[Image:Praetorian.jpg|150px|link=http://www.praetorian.com]]&lt;br /&gt;
|}&lt;br /&gt;
== Badge Sponsor  ==&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:Gemalto.jpg|185px|link=http://www.gemalto.com]]&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=86870</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=86870"/>
				<updated>2010-07-26T21:33:11Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:josh.sokol@ni.com Josh Sokol, President], [mailto:wickett@gmail.com James Wickett, Vice President], [mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair], [mailto:ggenung@denimgroup.com Greg Genung, Membership Chair], and the former chapter president is [mailto:cdewitt@indepthsec.com Cris Dewitt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;5&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;600&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:OWASP Lascon Logo.gif|right|117x87px]] &lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 Austin OWASP is hosting LASCON 2010 Lonestar Application Security Conference 2010]&lt;br /&gt;
| [http://austinowasp.ning.com/ Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett (512) 964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
July 27, 2010 - Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
August 12, 2010 - Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
August 31, 2010 - Application Assessments Reloaded (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
September 16, 2010 - Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
September 28, 2010 - Technology and Business Risk Management: How Application Security Fits In (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
October 26, 2010 - No Meeting (Come to [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010!]) &lt;br /&gt;
&lt;br /&gt;
October 29, 2010 - [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010] (@ Norris Conference Center, Austin, TX) &lt;br /&gt;
&lt;br /&gt;
November 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
December 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716 begin_of_the_skype_highlighting (512) 619-6716 end_of_the_skype_highlighting. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization]&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System]&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More]&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Whitepapers  ====&lt;br /&gt;
&lt;br /&gt;
*Whitepapers go here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
[mailto:sfoster@austinnetworking.com Scott Foster, Membership Chair] - (512) 637-9824 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.whitehatsec.com WhiteHat Security], [http://www.expandingsecurity.com Expanding Security], the [http://www.denimgroup.com Denim Group], [http://www.fortify.com Fortify], [http://www.bluecoat.com/ Blue Coat Systems], [http://www.setsolutions.com Set Solutions], and [http://www.praetorian.com Praetorian] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=86869</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=86869"/>
				<updated>2010-07-26T21:32:28Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:josh.sokol@ni.com Josh Sokol, President], [mailto:wickett@gmail.com James Wickett, Vice President], [mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair], [mailto:ggenung@denimgroup.com Greg Genung, Membership Chair], and the former chapter president is [mailto:cdewitt@indepthsec.com Cris Dewitt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;5&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;600&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:OWASP Lascon Logo.gif|right|117x87px]] &lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 Austin OWASP is hosting LASCON 2010 Lonestar Application Security Conference 2010]&lt;br /&gt;
| [http://austinowasp.ning.com/ Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security&lt;br /&gt;
&lt;br /&gt;
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows ... databases are vulnerable to a myriad of threats and attack vectors. &lt;br /&gt;
&lt;br /&gt;
In this session John Marler, a Senior Security Engineer with Imperva, will discuss the challenges of data security requirements imposed by today’s regulations, how organizations are achieving success and why organizations should do more than comply.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building B which is the 5-story building on campus. There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
July 27, 2010 - Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
August 12, 2010 - Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
August 31, 2010 - Application Assessments Reloaded (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
September 16, 2010 - Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
September 28, 2010 - Technology and Business Risk Management: How Application Security Fits In (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
October 26, 2010 - No Meeting (Come to [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010!]) &lt;br /&gt;
&lt;br /&gt;
October 29, 2010 - [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010] (@ Norris Conference Center, Austin, TX) &lt;br /&gt;
&lt;br /&gt;
November 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
December 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716 begin_of_the_skype_highlighting (512) 619-6716 end_of_the_skype_highlighting. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization]&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System]&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More]&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Whitepapers  ====&lt;br /&gt;
&lt;br /&gt;
*Whitepapers go here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
[mailto:sfoster@austinnetworking.com Scott Foster, Membership Chair] - (512) 637-9824 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.whitehatsec.com WhiteHat Security], [http://www.expandingsecurity.com Expanding Security], the [http://www.denimgroup.com Denim Group], [http://www.fortify.com Fortify], [http://www.bluecoat.com/ Blue Coat Systems], [http://www.setsolutions.com Set Solutions], and [http://www.praetorian.com Praetorian] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86649</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86649"/>
				<updated>2010-07-17T15:04:37Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
Registration Link (Coming soon) | [http://www.easychair.org/conferences/?conf=lascon2010 Hey Speakers! Submit Proposals Here] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter] | [http://www.norriscenters.com/Austin/ Norris Conference Center]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86648</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86648"/>
				<updated>2010-07-17T15:03:42Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | Registration Link (Coming soon) | [http://www.easychair.org/conferences/?conf=lascon2010 Hey Speakers! Submit Proposals Here] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86647</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86647"/>
				<updated>2010-07-17T15:03:16Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | Registration Link (Coming soon) | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/2/24/LASCON_Sponsorship_Options.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:james.wickett@owasp.org James Wickett] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Sponsors.jpg]]&lt;br /&gt;
&lt;br /&gt;
[[Image:LASCON_2010_Additional.jpg]]&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86472</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86472"/>
				<updated>2010-07-14T19:22:53Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | Registration Link (Coming soon) | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86471</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86471"/>
				<updated>2010-07-14T19:22:26Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86470</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86470"/>
				<updated>2010-07-14T19:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: /* LASCON is happening on October 29th, 2010 in Austin, TX */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals] | [http://twitter.com/LASCON10 Follow LASCON10 on Twitter]  \\&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86469</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86469"/>
				<updated>2010-07-14T18:37:12Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== LASCON is happening on October 29th, 2010 in Austin, TX =====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals]   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86468</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=86468"/>
				<updated>2010-07-14T18:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== LASCON is happening on October 29th, 2010 in Austin, TX ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals]   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=85981</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=85981"/>
				<updated>2010-07-08T15:57:18Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals]   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=85980</id>
		<title>Lonestar Application Security Conference 2010</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Lonestar_Application_Security_Conference_2010&amp;diff=85980"/>
				<updated>2010-07-08T15:56:45Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|LASCON 2010 Banner]] &lt;br /&gt;
&lt;br /&gt;
[http://www.norriscenters.com/Austin/ Norris Conference Center] | [http:// Registration Link (Coming soon)] | [http://www.easychair.org/conferences/?conf=lascon2010 Submit Proposals]   &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;!-- Header --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;background: none repeat scroll 0% 0% transparent; width: 100%; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''The full Lonestar Application Security Conference (LASCON) Schedule coming soon.''' &lt;br /&gt;
&lt;br /&gt;
'''You can register for the conference soon''' &amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Use the '''[https://twitter.com/appsec2010 #AppSec2010]''' hashtag for your tweets (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSec2010 Twitter Feed ([https://twitter.com/appsec2010 follow us on Twitter!])''' &amp;lt;twitter&amp;gt;appec2010&amp;lt;/twitter&amp;gt;--&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Call for Papers/Training  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is currently soliciting papers for the Lonestar Application Security Conference (LASCON) 2010 that will take place at the Norris Conference Center in Austin, TX on October 29, 2010. &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 &lt;br /&gt;
&lt;br /&gt;
We are seeking people and organizations that want to present on any of the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
  - Business Risks with Application Security&lt;br /&gt;
  - Starting and Managing Secure Development Lifecycle Programs&lt;br /&gt;
  - Web Services and XML Application Security&lt;br /&gt;
  - Metrics for Application Security&lt;br /&gt;
  - Application Threat Modeling&lt;br /&gt;
  - Hands-on Source Code Review&lt;br /&gt;
  - Web Application Security Testing&lt;br /&gt;
  - OWASP Tools and Projects&lt;br /&gt;
  - Secure Coding Practices (J2EE/.NET/Ruby)&lt;br /&gt;
  - Web Application Security countermeasures&lt;br /&gt;
  - Technology specific presentations on security such as AJAX, XML, etc&lt;br /&gt;
  - New Cutting-edge Application Security trends&lt;br /&gt;
  - Anything else relating to OWASP and Application Security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
To make a submission you must include&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
  - Presenter(s) name(s)&lt;br /&gt;
  - Presenter(s) Email and/or Phone number(s)&lt;br /&gt;
  - Presenter(s) bio(s)&lt;br /&gt;
  - Title&lt;br /&gt;
  - One Page Abstract&lt;br /&gt;
  - Links to past presentations (if available)&lt;br /&gt;
  - Any supporting research/tools (will not be released outside of CFP committee)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Submission deadline is August 30th at 12PM PST (GMT -8) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Not everyone who submits a proposal will be able to get to present at LASCON due to limited timeslots.  Also, in no way does sponsorship factor into the CFP committee's selection.  Speaking slots are not for sale.  &lt;br /&gt;
&lt;br /&gt;
Submit Proposals to: http://www.easychair.org/conferences/?conf=lascon2010 Conference Website: http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please forward to all interested practitioners and colleagues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration Not Yet Open!  ==&lt;br /&gt;
&lt;br /&gt;
OWASP [[Membership]] ($50 annual membership fee) gets you a discount on registration. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Non-Members &lt;br /&gt;
| $100 Until 9/15/2010 &lt;br /&gt;
| $150 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Members &lt;br /&gt;
| $50 Until 9/15/2010 &lt;br /&gt;
| $100 After 9/15/2010&lt;br /&gt;
|-&lt;br /&gt;
| Students with valid Student ID &lt;br /&gt;
| $30 Until 9/15/2010 &lt;br /&gt;
| $50 After 9/15/2010&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend LASCON 2010:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, you must present proof of current enrollment when picking up your badge. No exceptions. &lt;br /&gt;
&lt;br /&gt;
==== Volunteer  ====&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! Volunteers get free admission and invitation to the VIP event. This is your chance to rub elbows with the big players and mingle with potential networking contacts or even future employers! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Please contact james.wickett(at)ni.com to volunteer for a specific area: &lt;br /&gt;
&lt;br /&gt;
*Security &lt;br /&gt;
*Speakers and Trainers &lt;br /&gt;
*Vendors &lt;br /&gt;
*Facilities&lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [[Image:Volunteer Sheet.doc]] can be downloaded which outlines some of the responsibilities and available positions. Note: this document references the the DC conference last year, this is just for a general guideline. Updated document coming soon. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Training  ====&lt;br /&gt;
&lt;br /&gt;
Coming Soon &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
== Norris Conference Center  ==&lt;br /&gt;
&lt;br /&gt;
LASCON 2010 will be taking place at the [http://www.norriscenters.com/Austin/ Norris Conference Center] in Austin, TX. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Hotel  ====&lt;br /&gt;
&lt;br /&gt;
==== Sponsors  ====&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the LASCON 2010 Conference. Please refer to our [http://www.owasp.org/images/b/b3/OWASP_sponsorship_Irvine.pdf List of Sponsorship Opportunities] &lt;br /&gt;
&lt;br /&gt;
Please contact [mailto:kate.hartmann@owasp.org Kate Hartmann] for more information. &lt;br /&gt;
&lt;br /&gt;
Slots are going fast so contact us to sponsor today! &lt;br /&gt;
&lt;br /&gt;
[[Image:IrvineSponsors.png]] &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;10&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% transparent; -moz-background-inline-policy: continuous; color: white;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Platinum Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Gold Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
== Silver Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Organizational Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Reception Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
=== Coffee Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
| &amp;lt;br&amp;gt; &lt;br /&gt;
| &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Travel  ====&lt;br /&gt;
&lt;br /&gt;
== Traveling to the Austin Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_USA]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=85979</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=85979"/>
				<updated>2010-07-08T15:40:36Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:josh.sokol@ni.com Josh Sokol, President], [mailto:wickett@gmail.com James Wickett, Vice President], [mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair], [mailto:ggenung@denimgroup.com Greg Genung, Membership Chair], and the former chapter president is [mailto:cdewitt@indepthsec.com Cris Dewitt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;5&amp;quot; cellpadding=&amp;quot;5&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;600&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:OWASP Lascon Logo.gif|right|117x87px]] &lt;br /&gt;
| [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 Austin OWASP is hosting LASCON 2010 Lonestar Application Security Conference 2010]&lt;br /&gt;
| [http://austinowasp.ning.com/ Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security &lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
June 29, 2010 - AJAX Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
July 15 2010 - Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
July 27, 2010 - Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
August 12, 2010 - Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
August 31, 2010 - Application Assessments Reloaded (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
September 16, 2010 - Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
September 28, 2010 - Technology and Business Risk Management: How Application Security Fits In (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
October 26, 2010 - No Meeting (Come to [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010!]) &lt;br /&gt;
&lt;br /&gt;
October 29, 2010 - [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010] (@ Norris Conference Center, Austin, TX) &lt;br /&gt;
&lt;br /&gt;
November 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
December 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716 begin_of_the_skype_highlighting (512) 619-6716 end_of_the_skype_highlighting. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization]&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System]&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More]&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Whitepapers  ====&lt;br /&gt;
&lt;br /&gt;
*Whitepapers go here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
[mailto:sfoster@austinnetworking.com Scott Foster, Membership Chair] - (512) 637-9824 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.whitehatsec.com WhiteHat Security], [http://www.expandingsecurity.com Expanding Security], the [http://www.denimgroup.com Denim Group], [http://www.fortify.com Fortify], and [http://www.bluecoat.com/ Blue Coat Systems] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=85978</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=85978"/>
				<updated>2010-07-08T15:33:52Z</updated>
		
		<summary type="html">&lt;p&gt;Wickett: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:josh.sokol@ni.com Josh Sokol, President], [mailto:wickett@gmail.com James Wickett, Vice President], [mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair], [mailto:ggenung@denimgroup.com Greg Genung, Membership Chair], and the former chapter president is [mailto:cdewitt@indepthsec.com Cris Dewitt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}} &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Lascon Logo.gif|left|167x125px]] &lt;br /&gt;
[http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 Austin OWASP is hosting LASCON 2010 (Lonestar Application Security Conference 2010)] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 15, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security &lt;br /&gt;
&lt;br /&gt;
'''Who:''' John Marler (Imperva) &lt;br /&gt;
&lt;br /&gt;
John is a Senior Security Engineer with Imperva and has a decade of experience in designing, deploying and managing large infrastructure and network security solutions for Fortune 500 enterprises. After seven years with Dell IT, John moved into a network security consulting role for an IBM partner and went on to evangelize network security consolidation and simplification with Crossbeam Systems. Currently he is a senior security engineer with Imperva and specializes in web application and database security. &lt;br /&gt;
&lt;br /&gt;
John is a graduate of Texas A&amp;amp;amp;M University with a BBA in Information and Operations Management and holds multiple industry certs including Cisco networking &amp;amp;amp; design specializations, CheckPoint firewall, and TippingPoint IPS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 12, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events  ==&lt;br /&gt;
&lt;br /&gt;
June 29, 2010 - AJAX Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
July 15 2010 - Austin Security Professionals Happy Hour (Sponsored by Praetorian) &lt;br /&gt;
&lt;br /&gt;
July 27, 2010 - Data Attack Anatomy: Stopping Bad Guys &amp;amp;amp; Satisfying Auditors with Pragmatic Database Security (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
August 12, 2010 - Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
August 31, 2010 - Application Assessments Reloaded (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
September 16, 2010 - Austin Security Professionals Happy Hour (Sponsored by F5 and Accuvant) &lt;br /&gt;
&lt;br /&gt;
September 28, 2010 - Technology and Business Risk Management: How Application Security Fits In (@ National Instruments) &lt;br /&gt;
&lt;br /&gt;
October 26, 2010 - No Meeting (Come to [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010!]) &lt;br /&gt;
&lt;br /&gt;
October 29, 2010 - [http://www.owasp.org/index.php/Lonestar_Application_Security_Conference_2010 LASCON 2010] (@ Norris Conference Center, Austin, TX) &lt;br /&gt;
&lt;br /&gt;
November 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
December 2010 - No Meeting (Happy Holidays!) &lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 29, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' AJAX Security &lt;br /&gt;
&lt;br /&gt;
We will discuss what AJAX is, and how the different technologies combine to make it up. We will discuss some of the unique features, toolkits, and coding considerations, as well as security pitfalls, and ways to protect and detect them. &lt;br /&gt;
&lt;br /&gt;
*Introduction to AJAX &lt;br /&gt;
*Security Issues with architecture &lt;br /&gt;
*Toolkits &lt;br /&gt;
*Toolkit Security Concerns &lt;br /&gt;
*Bridges and Issues &lt;br /&gt;
*Attacking AJAX &lt;br /&gt;
*Defending AJAX &lt;br /&gt;
*Securing the Code &lt;br /&gt;
*Best Practices &lt;br /&gt;
*Other Issues and Concerns &lt;br /&gt;
*Q and A&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Brad Causey &lt;br /&gt;
&lt;br /&gt;
Brad Causey is an active member of the security and forensics community world­wide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is currently employed at a major international financial institution as a security analyst. Brad is the President of the OWASP Alabama chapter, a member of the OWASP Global Projects Committee and a contributor to the OWASP Live CD. He is also the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad currently holds certifications in the following arenas: MCSA, MCDBA, MCSE, MCT, MCP, GBLC, GGSC­100, C|EH, CIFI, CCNA,IT Project Management+, Security+, A+, Network+, CISSP, CGSP. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 17, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Set Solutions) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 25, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Javascript Hijacking &lt;br /&gt;
&lt;br /&gt;
This attack is an offshoot of Cross-Site Request Forgery (CSRF) and is common when AJAX is involved. It was well publicized in 2007 when the gmail contact list was found by Jeremiah Grossman to be vulnerable to it. This presentation will include a technical explanation of the attack, a demonstration, and a discussion. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben Broussard (UT Austin) &lt;br /&gt;
&lt;br /&gt;
Ben Broussard is a developer for the University of Texas at Austin with an academic background in mathematics, specifically cryptography. At UT he has translated and prioritized web application attacks in relation to the environment that the developers are working in. Ben is currently leading a web application security focused team of developers from different departments around campus. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Attacking Intranets from the Web Using DNS Rebinding &lt;br /&gt;
&lt;br /&gt;
DNS Rebinding works by implementing code that circumvents the web browser's same-origin policy and penetrates your private network. The exploit was popularized by RSnake in 2009. This presentation will explore how DNS Rebinding works, a walk-thru of a running demo, and what it means to your organization. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' James Wickett (National Instruments) &lt;br /&gt;
&lt;br /&gt;
James is the current Vice President of the Austin OWASP chapter and the former President. He works for National Instruments as a Web Systems Engineer in the R&amp;amp;amp;D department. Current certifications: CISSP, GCFW, GWAS &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716 begin_of_the_skype_highlighting (512) 619-6716 end_of_the_skype_highlighting. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 20, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by BlueCoat) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave) &lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques &lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.) &lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security. He is a part of the Cloud Security Alliance team developing their Controls Matrix. Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA. He holds an MBA from Texas A&amp;amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;amp;M-Corpus Christi, and is a certified CISSP. &lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington. &lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security? &lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games? Not really. These vectors are occurring today, and the threat vector has bled into the application space. What do you have to contend with once it passes through the firewall. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems) &lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems. Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope. Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security) &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization &lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization. The concept is simple...use tokens to represent your data instead of passing around the data itself. For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits? Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data. This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS. This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it. If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments) &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym &lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity weight training and high mental concentration. While the ultimate goal is often clear, one of the greatest mistakes bodybuilders consistently make is to overlook the importance of tracking their weight lifting progress. &lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle program must consistently log simple to obtain, yet meaningful metrics throughout the entire process. Good metrics must lack subjectivity and clearly aid decision makers to determine areas that need improvement. In this presentation we’ll discuss metrics used to classify and appropriately compare security vulnerabilities found in different phases of the SDL by different teams working in different locations and in different products. We’ll also discuss how to easily provide decision makers different views of the same data and verify whether the process is indeed catching critical vulnerabilities internally. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec) &lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the Office of the CTO at Symantec Corporation. In this role he leads efforts across the company to ensure the secure development of software products. His responsibilities include managing Symantec’s internal secure software development process, training, threat modeling and penetration testing. Cassio’s background includes over 12 years of technical and managerial experience in the software industry. During the six years he has been with Symantec, he has helped to architect, design and develop several top selling product releases, conducted numerous security classes, and coordinated various penetration tests. &lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2 in the development of the CSSLP certification. He holds a bachelor degree in computer science from Pontificia Universidade Catolica do Rio Grande Do Sul, a masters degree in software engineering from Santa Clara University, and a masters of business administration from the University of Southern California. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World &lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group) &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP &lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever. This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way. OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security. Projects covered include the OWASP Top 10, OWASP Testing Guide, Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others. A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided. In this case study the company realized annual reduction in spending of several hundred thousand dollars. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester. Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx. Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;amp;M University. He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling &lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team &lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
&lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000. &lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache &lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers. It was quickly picked up and used by Iranian government protesters. This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!! &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis &lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security enthusiast. He has worked in the AFCERT looking for intrusions into Air Force computers, and handled application security and cryptography issues for Paypal. He is currently a programmer for Giganews in Austin. He is also the author of an online book on security called &amp;quot;Security Concepts&amp;quot;, located here: &lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques. After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic. This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems &lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up. We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques. Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security &lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly. &lt;br /&gt;
&lt;br /&gt;
Topics covered include: &lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;amp;lt;http://www.pcicomplianceguide.org/&amp;amp;gt; and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site. &lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data &lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored: &lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions; &lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and &lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches. &lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process? &lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson &lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party &lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting. &lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk: &lt;br /&gt;
&lt;br /&gt;
1. The statelessness of the internet &lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works &lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack &lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy &lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Who:''' Ben L Broussard &lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More &lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and their uses. We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues? Did you know that you can use RatProxy for W3C compliance validation? By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol &lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008 &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008. &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project &lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD. As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going. Some of the design goals include: &lt;br /&gt;
&lt;br /&gt;
#easy for the users to keep the tools updated &lt;br /&gt;
#easy for the project lead to keep the tools updated &lt;br /&gt;
#easy to produce releases (I'm thinking quarterly releases) &lt;br /&gt;
#focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page: http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
Project Wiki: http://mtesauro.com/livecd/ &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando &lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award. &lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc. He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project. He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect &lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free &lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency &lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the OWASP SoC Live CD project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project &lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio: A. J. Scotka Senior Software Quality Engineer, Texas Education Agency As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently responsible for quality reviews on design and code, software configuration management process, build engineering process, release engineering process, verification and validation throughout the life cycle and over all quality improvement across all areas of enterprise code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Topic: ''' Securely Handling Sensitive Configuration Data. &lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive data available on a need to know basis. The classic case of this is database credentials. The application needs them to connect to the database but developers shouldn't have direct access to the DB - particularly the production DB. The presentation will discuss how we took on this specific problem, our determination that this was a specific case of a more general problem and how we solved that general problem. In our solution, sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). We will then cover our implementation of that solution in a .Net 2.0 environment and discuss some options for J2EE environments. So far, we used our .Net solution successfully for database credentials and private encryption keys used in XML-DSig. Sensitive data is only available to the application and trusted 3rd parties (e.g. DBAs). &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security The concept of web services has become ubiquitous over the last few years. Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse. Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers. However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology. This presentation will first aim to identify the risks associated with web services. We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status. Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul &lt;br /&gt;
&lt;br /&gt;
Bio Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp;amp; Education. &lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled &lt;br /&gt;
&lt;br /&gt;
Abstract - What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more … The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies. &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security &lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them. This presentation looks at how these techniques can be used to identify security defects in applications. Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws. In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform. Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code &lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive &lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown &lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance. The stairs are located on the West Side of the building, just north of the main entrance. There is no access to the Plaza level from inside the store. &lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger) &lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws''' &lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic. &lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security) &lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize and track users both from an offensive and defensive standpoint. He will discuss how the giants of the industry do it and next generation tactics alike. &lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703. Come to the Whole Foods plaza level and sign in with receptionist. See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments &amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin &amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence. &amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments. [http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments. H.D. Moore (creator of MetaSploit will be presenting) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels). There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''December Meeting''' - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist) &lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives  ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings: &lt;br /&gt;
&lt;br /&gt;
*March 2010 - [http://www.owasp.org/images/c/cc/Enterprise_Application_Security_Practices.ppt Enterprise Application Security Practices: Real-world Tips and Techniques]&lt;br /&gt;
&lt;br /&gt;
*February 2010 - [http://www.owasp.org/images/9/90/Advanced_Persistent_Threats.pdf Advanced Persistent Threat - What Does it Mean for Application Security?]&lt;br /&gt;
&lt;br /&gt;
*January 2010 - [http://www.owasp.org/images/a/ae/Reducing_Your_Data_Security_Risk_Through_Tokenization.pptx Reducing Your Data Security Risk Through Tokenization]&lt;br /&gt;
&lt;br /&gt;
*September 2009 - [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf OWASP ROI: Optimize Security Spending using OWASP]&lt;br /&gt;
&lt;br /&gt;
*August 2009 - [http://www.owasp.org/images/9/97/TM.pptx Threat Modeling]&lt;br /&gt;
&lt;br /&gt;
*April 2009 - [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Architecting a Secure Web System]&lt;br /&gt;
&lt;br /&gt;
*October 2008 - [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Using Proxies to Secure Applications and More]&lt;br /&gt;
&lt;br /&gt;
*August 2007 - [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt OWASP Testing Framework]&lt;br /&gt;
&lt;br /&gt;
*July&amp;amp;nbsp;? - [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
*August&amp;amp;nbsp;? - [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Whitepapers  ====&lt;br /&gt;
&lt;br /&gt;
*Whitepapers go here&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230 &lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 683-6410 &lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808 &lt;br /&gt;
&lt;br /&gt;
[mailto:sfoster@austinnetworking.com Scott Foster, Membership Chair] - (512) 637-9824 &lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities  ====&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities. If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter. This event has historically drawn around 30 of Austin's finest security professionals for networking and more. Your sponsorship of this event includes appetizers and drinks for the attendees. We typically do $100 in appetizers and $200 in drink tickets. By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink. Feel free to pass out business cards and network just like you would anywhere else. You'll find no better opportunity to get your name in front of 30+ security professionals for around $300. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM. For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees. In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship''' &lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can. While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters. In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers. You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting. &lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.whitehatsec.com WhiteHat Security], [http://www.expandingsecurity.com Expanding Security], the [http://www.denimgroup.com Denim Group], [http://www.fortify.com Fortify], and [http://www.bluecoat.com/ Blue Coat Systems] for their sponsorships during the past year. &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about'' &amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Wickett</name></author>	</entry>

	</feed>