<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=YossiOren</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=YossiOren"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/YossiOren"/>
		<updated>2026-05-08T13:06:44Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Israel&amp;diff=233977</id>
		<title>Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Israel&amp;diff=233977"/>
				<updated>2017-10-02T19:28:05Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: link to appsecil17 from the &amp;quot;current attiuvity&amp;quot; page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP_Chapter]]&lt;br /&gt;
[[image:Owasp_Israel_logo.png|center|500px]]&lt;br /&gt;
__NOTOC__ &amp;lt;!-- This removes the Table Of Contents on this page --&amp;gt;&lt;br /&gt;
&amp;lt;!-- Any = Heading 1 = markup will create a new tab until after the &amp;lt;/headertabs&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 1st Tab start --&amp;gt;&lt;br /&gt;
= Welcome =&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=&amp;lt;br&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&amp;lt;!-- 1st Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 2nd Tab start --&amp;gt;&lt;br /&gt;
= Current Activity =&lt;br /&gt;
&lt;br /&gt;
== Meetings ==&lt;br /&gt;
&lt;br /&gt;
* Get ready for OWASP [[AppSec Israel 2017]], to be held on October 17-18, 2017!&lt;br /&gt;
* OWASP Europe 2018 is planned to be in Israel. For sponsorship, questions, suggestions and more, contanct '''[mailto:avi.douglen@owasp.org Avi Douglen]'''&lt;br /&gt;
* [http://www.meetup.com/OWASP-Israel/ Ongoing Meetings and socialization on Meetup]. [[file:Meetup-logo-2x.png|75px|link=http://www.meetup.com/OWASP-Israel/]]&lt;br /&gt;
&lt;br /&gt;
== Hebrew Translations ==  &lt;br /&gt;
&lt;br /&gt;
; '''The OWASP Top 10, 2013 version was translated to Hebrew! &amp;lt;br&amp;gt; '''&lt;br /&gt;
It is now [[OWASP_Top10_Hebrew|available for download]].&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_Risk_Rating_Methodology|OWASP Risk Rating Methodology]], part of the [[OWASP_Testing_Project|OWASP Testing Project]], has been translated to Hebrew, and is available for download in [[Media:OWASP_Risk_Rating_Methodology-Hebrew.pdf|PDF format]]. &lt;br /&gt;
Much thanks to Tal Argoni from TriadSec.&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
* Security discussion forum in Hebrew - on [https://www.facebook.com/groups/owasp.il/ Facebook]. [[file:Facebook_logo_small.jpg|100px|link=https://www.facebook.com/groups/owasp.il/]]&lt;br /&gt;
* [https://www.linkedin.com/groups/39702 LinkedIn Group] for networking and announcements. [[file:Delhi_linkedin.jpg|100px|link=https://www.linkedin.com/groups/39702]]&lt;br /&gt;
* [https://owasp.slack.com/messages/chapter-israel/ Chat room] for security in Hebrew. [[file:Slack.png|90px|link=https://owasp.slack.com/messages/chapter-israel/]]  &lt;br /&gt;
* [https://twitter.com/OWASP_IL Twitter] account. [[file:twitter_wide.jpg|75px|link=https://twitter.com/OWASP_IL]]&lt;br /&gt;
* [[OWASP_IL_Sponsorship|Sponsorship opportunities]], including #AppSecIL conference sponsorship. &lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up! Contact [mailto:avi.douglen@owasp.org Avi Douglen] with any ideas you have.&lt;br /&gt;
&amp;lt;!-- 2nd Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 3rd Tab start --&amp;gt;&lt;br /&gt;
= Chapter Details =&lt;br /&gt;
== The Team ==&lt;br /&gt;
&lt;br /&gt;
Chapter leader: '''[mailto:avi.douglen@owasp.org Avi Douglen]'''.&lt;br /&gt;
&lt;br /&gt;
* OWASP Israel Board: '''[mailto:avi.douglen@owasp.org Avi Douglen]''', '''Or Katz''', ''' Ofer Maor''', '''Erez Metula''', '''Hemed Gur Ary''', '''[[User:YossiOren|Dr. Yossi Oren]]'''&lt;br /&gt;
* Chapter Founder: '''[mailto:ofer@shezaf.com Ofer Shezaf]'''&lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew]]: Or Katz&lt;br /&gt;
* Homepage Maintenance: Avi Douglen, Ofer Maor, Yossi Oren, [[User:Eyigal|Yigal Elefant]]&lt;br /&gt;
* Mailing List Management: Avi Douglen, Ofer Maor, Or Katz   &lt;br /&gt;
&lt;br /&gt;
== General Activity ==&lt;br /&gt;
* An annual conference, usually in September or October. &lt;br /&gt;
* Periodic meetings. If you would like to host a meeting or speak in one contact [mailto:avi.douglen@owasp.org Avi Douglen] or [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
* Translation of OWASP resources to Hebrew&lt;br /&gt;
* Spreading the Word - Reaching out for more people, especially outside of the AppSec community.&lt;br /&gt;
&amp;lt;!-- 3rd Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- 4th Tab start --&amp;gt;&lt;br /&gt;
= Previous Annual Conferences =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2016|AppSec Israel 2016]]'''&lt;br /&gt;
| '''September 19th 2016'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''more than 650 attendees!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2016_Presentations|presentations info page]] to download presentations and videos&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2015|AppSec Israel 2015]]'''&lt;br /&gt;
| '''October 13th, 2015'''&lt;br /&gt;
| '''College of Management'''&lt;br /&gt;
| '''over 550 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2015_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[AppSec_Israel_2014|AppSec Israel 2014]]'''&lt;br /&gt;
| '''September 2nd, 2014'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
| '''over 450 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[AppSec_Israel_2014_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2013|OWASP Israel 2013]]'''&lt;br /&gt;
| '''October 1st, 2013'''&lt;br /&gt;
|&lt;br /&gt;
| '''480 participants!'''&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |Use the [[OWASP_Israel_2013_Presentations|presentations info page]] to download presentations&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2012|OWASP Israel 2012 conference]]'''&lt;br /&gt;
| '''Sep 5th, 2012'''&lt;br /&gt;
| '''IDC'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2011|OWASP Israel 2011 Conference]]'''&lt;br /&gt;
| '''Sep 15th, 2011'''&lt;br /&gt;
| '''IDC in Herzeliya'''&lt;br /&gt;
| '''350 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2010|OWASP Israel 2010 Conference]]'''&lt;br /&gt;
| '''Sep 6th, 2010'''&lt;br /&gt;
| '''IDC in Herzliya'''&lt;br /&gt;
| '''150 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2009|OWASP Israel 2009]]'''&lt;br /&gt;
| '''Sunday, September 6th 2009'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |You can find the agenda and uploaded presentations [[OWASP_Israel_2009|here]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference&lt;br /&gt;
at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''September 14th, 2008'''&lt;br /&gt;
| '''Interdisciplinary Center Herzliya'''&lt;br /&gt;
| '''250 attendees'''&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]'''&lt;br /&gt;
| '''June 3rd, 2008'''&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |OWASP sponsored the IDC Security Road Show event in Israel. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| '''[[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]'''&lt;br /&gt;
| '''Dec 3rd 2007'''&lt;br /&gt;
| '''Interdisciplinary Center (IDC) Herzliya'''&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya.&lt;br /&gt;
The conference really set itself as an event you must come to if you have anything to do with application security. [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 4th Tab end --&amp;gt;&lt;br /&gt;
&amp;lt;!-- 5th Tab start --&amp;gt;&lt;br /&gt;
= Previous Meetings =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot; style=&amp;quot;text-align:center;&amp;quot; |&lt;br /&gt;
! width=&amp;quot;250&amp;quot; | Name&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Location&lt;br /&gt;
! width=&amp;quot;200&amp;quot; | Attendance&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2017|OWASP Israel June 2017]]&lt;br /&gt;
| June 20th, 2017&lt;br /&gt;
| Intuit Israel, HaHarash St. 4, Hod Hasharon&lt;br /&gt;
| &lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2017|OWASP Israel April 2017]]&lt;br /&gt;
| April 3rd, 2017&lt;br /&gt;
| Checkmarx's offices, in the Amot Atrium Tower, 2 Jabotinsky St., Ramat Gan&lt;br /&gt;
| 75 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2017|OWASP Israel January 2017]]&lt;br /&gt;
| January 18th, 2017&lt;br /&gt;
| Radware’s Tel Aviv offices, at Raul Wallenberg 22, Ramat HaChayal&lt;br /&gt;
| 120 people&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2016|OWASP Israel June 2016]]&lt;br /&gt;
| June 14, 2016&lt;br /&gt;
| Amdocs Auditorium in Raanana&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2016|OWASP Israel April 2016]]&lt;br /&gt;
| April 12, 2016&lt;br /&gt;
| HP Enterprise in Yehud&lt;br /&gt;
| 150 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_February_2016|OWASP Israel February 2016]]&lt;br /&gt;
| February 2, 2016&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2015|OWASP Israel June 2015]]&lt;br /&gt;
| June 16, 2015&lt;br /&gt;
| Microsoft in Herzeliya&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_March_2015|OWASP Israel March 2015]]&lt;br /&gt;
| March 30, 2015&lt;br /&gt;
| NCR in Raanana&lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_June_2014|OWASP Israel June 2014]]&lt;br /&gt;
| June 16, 2014&lt;br /&gt;
| F5 Networks in Tel Aviv&lt;br /&gt;
| 110 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_April_2014|OWASP Israel April 2014]]&lt;br /&gt;
| April 23, 2014&lt;br /&gt;
| Akamai in Herzliya Pituach&lt;br /&gt;
| 100 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_January_2014|OWASP Israel January 2014]]&lt;br /&gt;
| January 14th, 2014&lt;br /&gt;
| Amdocs in Ra'anana &lt;br /&gt;
| 120 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_05|OWASP Israel May 2013]]&lt;br /&gt;
| May 28th, 2013&lt;br /&gt;
| RSA&lt;br /&gt;
| 80 participants&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2013_02|OWASP Israel February 2013]]&lt;br /&gt;
| February 12th, 2013&lt;br /&gt;
| E&amp;amp;Y&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |[[OWASP_ISRAEL_2013_02_Hebrew|Hebrew version]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_06|OWASP Israel Jun-2010]]&lt;br /&gt;
| Jun 22nd, 2010&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_02|OWASP Israel Feb-2010]]&lt;br /&gt;
| Feb 9th, 2010&lt;br /&gt;
| Amdocs in Ra'anana&lt;br /&gt;
| 70 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2010_01|OWASP Israel Jan-2010]]&lt;br /&gt;
| Jan 12th, 2010 &lt;br /&gt;
| Breach Security in Herzliya&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_12|OWASP Israel Dec-2009]]&lt;br /&gt;
| Dec 2009&lt;br /&gt;
| IBM/Watchfire in Herzliya&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]]&lt;br /&gt;
| May 7th, 2009&lt;br /&gt;
| IBM in Park Azorim in Petach-Tikva&lt;br /&gt;
|&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_05_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]]&lt;br /&gt;
| March 26th, 2009&lt;br /&gt;
| Tel-Aviv University&lt;br /&gt;
| 60 attendees&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, 2bsecure ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, Breach Security ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, Xiom ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [[OWASP_ISRAEL_2009_03_Hebrew|Full details in Hebrew]]&lt;br /&gt;
|- align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]]&lt;br /&gt;
| January 28th, 2009&lt;br /&gt;
| Checkpoint&lt;br /&gt;
| 100 people&lt;br /&gt;
|- align=&amp;quot;left&amp;quot;&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; |The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- 5th Tab end --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Above the following line = Heading 1 = will create a new tab --&amp;gt;&lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&amp;lt;!-- Below this line = Heading 1 = will not create tabs anymore --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Sponsors = &lt;br /&gt;
&lt;br /&gt;
The OWASP Israel chapter's yearly activity is being supported by the generous sponsorship of the following companies: &lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP_Israel_Sponsors}} &lt;br /&gt;
&lt;br /&gt;
[[Category:Middle East]] &lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2017&amp;diff=233976</id>
		<title>AppSec Israel 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2017&amp;diff=233976"/>
				<updated>2017-10-02T19:23:58Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: More content, link to official website&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The annual OWASP AppSec Israel Conference is the largest conference in Israel for application security,&lt;br /&gt;
&lt;br /&gt;
and regularly draws hundreds of participants. [[AppSec Israel 2016|Over 650 people attended last year]]!&lt;br /&gt;
&lt;br /&gt;
But AppSecIL is not just for security experts!&lt;br /&gt;
&lt;br /&gt;
Over 700 developers, testers, architects, product designers, and managers will attend this year.&lt;br /&gt;
&lt;br /&gt;
Everyone involved with the software lifecycle is welcome, regardless of type of software, website, mobile app, or any other type of application.&lt;br /&gt;
&lt;br /&gt;
If you are responsible for, or involved with:&lt;br /&gt;
* web security&lt;br /&gt;
* devops security&lt;br /&gt;
* cloud security&lt;br /&gt;
* mobile security&lt;br /&gt;
* application security&lt;br /&gt;
* software development&lt;br /&gt;
* quality assurance&lt;br /&gt;
* software maintenance or operations&lt;br /&gt;
… you should join us at AppSecIL!&lt;br /&gt;
&lt;br /&gt;
AppSec Israel 2017 will have two lecture tracks from an amazing group of speakers, and additional activities such as a Capture the Flag competition. &lt;br /&gt;
&lt;br /&gt;
We also host a sponsors pavilion with vendor booths to promote the latest advances in security technology relevant to application security and developers.&lt;br /&gt;
&lt;br /&gt;
Don’t forget to use the [https://twitter.com/hashtag/AppSecIL #AppSecIL] hashtag on social media!&lt;br /&gt;
&lt;br /&gt;
Attendance is free, but registration is required!&lt;br /&gt;
&lt;br /&gt;
[https://appsecil.org For more information, see the official AppSecIL website].&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] &lt;br /&gt;
[[Category:AppSec_Israel_2017]] &lt;br /&gt;
[[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2017&amp;diff=232441</id>
		<title>AppSec Israel 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2017&amp;diff=232441"/>
				<updated>2017-08-17T21:41:57Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: created stub&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP AppSec Israel will take place this year on October 18th, 2017!&lt;br /&gt;
&lt;br /&gt;
The annual OWASP AppSec Israel Conference is the largest conference in Israel for application and software security, has been going regularly for over a decade and always draws hundreds of participants.&lt;br /&gt;
[[AppSec Israel 2016|Over 650 people attended last year]], this year we expect well over 700!&lt;br /&gt;
&lt;br /&gt;
The Conference usually starts at 9AM and lasts until 18:00. It will also be preceded by a day of Developer Training.&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:AppSec_Israel_2017]] [[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221118</id>
		<title>AppSec Israel 2016 CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221118"/>
				<updated>2016-09-08T12:18:15Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: backlink added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:EventBriteRegisterButton.png|link=https://appsecil2016.sched.org/event/8CKb|Register now!]]&lt;br /&gt;
&lt;br /&gt;
This year, for the first time, [[AppSec Israel 2016|AppSec Israel]] will be hosting our very own Capture the Flag competition! &lt;br /&gt;
&lt;br /&gt;
This capture the flag competition aims to encourage and promote interest in web application security, as well as for just having some fun.&lt;br /&gt;
&lt;br /&gt;
We do not see it as a competition really, though there are winners and they are going to win some cool prizes...&lt;br /&gt;
&lt;br /&gt;
There are a lot of interesting talks at OWASP this year that you wouldn't want to miss.. So, it is perfectly ok if you don't end up collecting all flags.. We know, you have been busy.. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Here are some FAQ I frequently hear (I never heard them actually, but what the hack?)&lt;br /&gt;
&lt;br /&gt;
==Is there any registration needed?==&lt;br /&gt;
&lt;br /&gt;
Registration is available here (just add yourself to my sched) or on site, at Komodo booth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What prizes do the winners get?==&lt;br /&gt;
&lt;br /&gt;
There are going to be 4 prizes. 3 top scores will get a prize while one prize will be won by a lottery between all who scores a minimum of 10 points.&lt;br /&gt;
&lt;br /&gt;
If there are 2 attendees who reached the same score, a lottery   between the two will be taken.&lt;br /&gt;
&lt;br /&gt;
Oh.. and the prizes.. We'll decide soon enough and let you know.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What is the CTF structure?==&lt;br /&gt;
&lt;br /&gt;
We have built a PHP based web application that holds 6 challenges. Each challenge require a knowledge of a different attack or a different attack vector. Once you find the flag, you should use our 'proof of hack' PHP page to get the scores.&lt;br /&gt;
&lt;br /&gt;
We might add a 'buy a hint' functionality, but even if we won't there are going to be plenty of people around who could steer you to the right direction.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==At what time does the CTF take place?==&lt;br /&gt;
&lt;br /&gt;
The CTF will be open all day long, starting at the first talk and till the end of last one.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==What should I bring?==&lt;br /&gt;
&lt;br /&gt;
Bring your kali linux. Well, there is no need for that really, just kidding.&lt;br /&gt;
&lt;br /&gt;
What you might need is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Laptop, any OS will do.&lt;br /&gt;
# Internet connection.&lt;br /&gt;
# Python installed (2.x I believe)&lt;br /&gt;
# HTTP Proxy (burp, fiddler, whatever…)&lt;br /&gt;
# Wireshark, tcpdump or something like that&lt;br /&gt;
# Internet facing server (but we can provide you with that if needed)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Of course, you might get all flags without needing any of the above. That would be super cool, we would love to see your take on our challenges.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==How long should it take?==&lt;br /&gt;
&lt;br /&gt;
The CTF is open for the entire day. We estimate each challenge to take approximately 30 minutes, so it is 3 hours altogether.&lt;br /&gt;
&lt;br /&gt;
All challenges are solvable in a matter of few minutes, once you know how. The difficulty level vary from entry level to advance.&lt;br /&gt;
&lt;br /&gt;
There is one which may take quite a while and will require determination and persistency to solve.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://appsecil2016.sched.org/event/8CKb|Register now!]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:AppSec_Israel_2016]] [[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221088</id>
		<title>AppSec Israel 2016 CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221088"/>
				<updated>2016-09-07T15:10:10Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added categories, skinned &amp;quot;register now&amp;quot; button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:EventBriteRegisterButton.png|link=https://appsecil2016.sched.org/event/8CKb|Register now!]]&lt;br /&gt;
&lt;br /&gt;
This capture the flag competition aims to encourage and promote interest in web application security, as well as for just having some fun.&lt;br /&gt;
&lt;br /&gt;
We do not see it as a competition really, though there are winners and they are going to win some cool prizes...&lt;br /&gt;
&lt;br /&gt;
There are a lot of interesting talks at OWASP this year that you wouldn't want to miss.. So, it is perfectly ok if you don't end up collecting all flags.. We know, you have been busy.. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Here are some FAQ I frequently hear (I never heard them actually, but what the hack?)&lt;br /&gt;
&lt;br /&gt;
==Is there any registration needed?==&lt;br /&gt;
&lt;br /&gt;
Registration is available here (just add yourself to my sched) or on site, at Komodo booth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What prizes do the winners get?==&lt;br /&gt;
&lt;br /&gt;
There are going to be 4 prizes. 3 top scores will get a prize while one prize will be won by a lottery between all who scores a minimum of 10 points.&lt;br /&gt;
&lt;br /&gt;
If there are 2 attendees who reached the same score, a lottery   between the two will be taken.&lt;br /&gt;
&lt;br /&gt;
Oh.. and the prizes.. We'll decide soon enough and let you know.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What is the CTF structure?==&lt;br /&gt;
&lt;br /&gt;
We have built a PHP based web application that holds 6 challenges. Each challenge require a knowledge of a different attack or a different attack vector. Once you find the flag, you should use our 'proof of hack' PHP page to get the scores.&lt;br /&gt;
&lt;br /&gt;
We might add a 'buy a hint' functionality, but even if we won't there are going to be plenty of people around who could steer you to the right direction.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==At what time does the CTF take place?==&lt;br /&gt;
&lt;br /&gt;
The CTF will be open all day long, starting at the first talk and till the end of last one.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==What should I bring?==&lt;br /&gt;
&lt;br /&gt;
Bring your kali linux. Well, there is no need for that really, just kidding.&lt;br /&gt;
&lt;br /&gt;
What you might need is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Laptop, any OS will do.&lt;br /&gt;
# Internet connection.&lt;br /&gt;
# Python installed (2.x I believe)&lt;br /&gt;
# HTTP Proxy (burp, fiddler, whatever…)&lt;br /&gt;
# Wireshark, tcpdump or something like that&lt;br /&gt;
# Internet facing server (but we can provide you with that if needed)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Of course, you might get all flags without needing any of the above. That would be super cool, we would love to see your take on our challenges.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==How long should it take?==&lt;br /&gt;
&lt;br /&gt;
The CTF is open for the entire day. We estimate each challenge to take approximately 30 minutes, so it is 3 hours altogether.&lt;br /&gt;
&lt;br /&gt;
All challenges are solvable in a matter of few minutes, once you know how. The difficulty level vary from entry level to advance.&lt;br /&gt;
&lt;br /&gt;
There is one which may take quite a while and will require determination and persistency to solve.&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://appsecil2016.sched.org/event/8CKb|Register now!]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:AppSec_Israel_2016]] [[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221087</id>
		<title>AppSec Israel 2016 CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221087"/>
				<updated>2016-09-07T15:08:03Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added formatting and unskinned &amp;quot;register now!&amp;quot; button&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[https://appsecil2016.sched.org/event/8CKb Register now!]&lt;br /&gt;
&lt;br /&gt;
This capture the flag competition aims to encourage and promote interest in web application security, as well as for just having some fun.&lt;br /&gt;
&lt;br /&gt;
We do not see it as a competition really, though there are winners and they are going to win some cool prizes...&lt;br /&gt;
&lt;br /&gt;
There are a lot of interesting talks at OWASP this year that you wouldn't want to miss.. So, it is perfectly ok if you don't end up collecting all flags.. We know, you have been busy.. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Here are some FAQ I frequently hear (I never heard them actually, but what the hack?)&lt;br /&gt;
&lt;br /&gt;
==Is there any registration needed?==&lt;br /&gt;
&lt;br /&gt;
Registration is available here (just add yourself to my sched) or on site, at Komodo booth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What prizes do the winners get?==&lt;br /&gt;
&lt;br /&gt;
There are going to be 4 prizes. 3 top scores will get a prize while one prize will be won by a lottery between all who scores a minimum of 10 points.&lt;br /&gt;
&lt;br /&gt;
If there are 2 attendees who reached the same score, a lottery   between the two will be taken.&lt;br /&gt;
&lt;br /&gt;
Oh.. and the prizes.. We'll decide soon enough and let you know.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==What is the CTF structure?==&lt;br /&gt;
&lt;br /&gt;
We have built a PHP based web application that holds 6 challenges. Each challenge require a knowledge of a different attack or a different attack vector. Once you find the flag, you should use our 'proof of hack' PHP page to get the scores.&lt;br /&gt;
&lt;br /&gt;
We might add a 'buy a hint' functionality, but even if we won't there are going to be plenty of people around who could steer you to the right direction.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==At what time does the CTF take place?==&lt;br /&gt;
&lt;br /&gt;
The CTF will be open all day long, starting at the first talk and till the end of last one.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==What should I bring?==&lt;br /&gt;
&lt;br /&gt;
Bring your kali linux. Well, there is no need for that really, just kidding.&lt;br /&gt;
&lt;br /&gt;
What you might need is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Laptop, any OS will do.&lt;br /&gt;
# Internet connection.&lt;br /&gt;
# Python installed (2.x I believe)&lt;br /&gt;
# HTTP Proxy (burp, fiddler, whatever…)&lt;br /&gt;
# Wireshark, tcpdump or something like that&lt;br /&gt;
# Internet facing server (but we can provide you with that if needed)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Of course, you might get all flags without needing any of the above. That would be super cool, we would love to see your take on our challenges.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==How long should it take?==&lt;br /&gt;
&lt;br /&gt;
The CTF is open for the entire day. We estimate each challenge to take approximately 30 minutes, so it is 3 hours altogether.&lt;br /&gt;
&lt;br /&gt;
All challenges are solvable in a matter of few minutes, once you know how. The difficulty level vary from entry level to advance.&lt;br /&gt;
&lt;br /&gt;
There is one which may take quite a while and will require determination and persistency to solve.&lt;br /&gt;
&lt;br /&gt;
[https://appsecil2016.sched.org/event/8CKb Register now!]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221086</id>
		<title>AppSec Israel 2016 CTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016_CTF&amp;diff=221086"/>
				<updated>2016-09-07T14:59:31Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: copy-paste from the sched&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This CTF competition aims to encourage and promote interest in web application security, as well as for just having some fun.&lt;br /&gt;
&lt;br /&gt;
We do not see it as a competition really, though there are winners and they are going to win some cool prizes...&lt;br /&gt;
&lt;br /&gt;
There are a lot of interesting talks at OWASP this year that you wouldn't want to miss.. So, it is perfectly ok if you don't end up collecting all flags.. We know, you have been busy.. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Here are some FAQ I frequently hear (I never heard them actually, but what the hack?)&lt;br /&gt;
&lt;br /&gt;
Is there any registration needed?&lt;br /&gt;
&lt;br /&gt;
Registration is available here (just add yourself to my sched) or on site, at Komodo booth.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
What prizes do the winners get?&lt;br /&gt;
&lt;br /&gt;
There are going to be 4 prizes. 3 top scores will get a prize while one prize will be won by a lottery between all who scores a minimum of 10 points.&lt;br /&gt;
&lt;br /&gt;
If there are 2 attendees who reached the same score, a lottery   between the two will be taken.&lt;br /&gt;
&lt;br /&gt;
Oh.. and the prizes.. We'll decide soon enough and let you know.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
What is the CTF structure?&lt;br /&gt;
&lt;br /&gt;
We have built a PHP based web application that holds 6 challenges. Each challenge require a knowledge of a different attack or a different attack vector. Once you find the flag, you should use our 'proof of hack' PHP page to get the scores.&lt;br /&gt;
&lt;br /&gt;
We might add a 'buy a hint' functionality, but even if we won't there are going to be plenty of people around who could steer you to the right direction.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
What time do the CTF take place?&lt;br /&gt;
&lt;br /&gt;
The CTF will be open all day long, starting at the first talk and till the end of last one.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
What should I bring?&lt;br /&gt;
&lt;br /&gt;
Bring your kali linux. Well, there is no need for that really, just kidding.&lt;br /&gt;
&lt;br /&gt;
What you might need is:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Laptop, any OS will do.&lt;br /&gt;
&lt;br /&gt;
Internet connection.&lt;br /&gt;
&lt;br /&gt;
Python installed (2.x I believe)&lt;br /&gt;
&lt;br /&gt;
HTTP Proxy (burp, fiddler, whatever…)&lt;br /&gt;
&lt;br /&gt;
Wireshark, tcpdump or something like that&lt;br /&gt;
&lt;br /&gt;
Internet facing server (but we can provide you with that if needed)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Of course, you might get all flags without needing any of the above. That would be super cool, we would love to see your take on our challenges.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
How long should it take?&lt;br /&gt;
&lt;br /&gt;
The CTF is open for the entire day. We estimate each challenge to take approximately 30 minutes, so it is 3 hours altogether.&lt;br /&gt;
&lt;br /&gt;
All challenges are solvable in a matter of few minutes, once you know how. The difficulty level vary from entry level to advance.&lt;br /&gt;
&lt;br /&gt;
There is one which may take quite a while and will require determination and persistency to solve.&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=AppSec_Israel_2016&amp;diff=221085</id>
		<title>AppSec Israel 2016</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=AppSec_Israel_2016&amp;diff=221085"/>
				<updated>2016-09-07T14:58:22Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: /* Agenda */ CTF&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
The annual OWASP AppSec Israel Conference is the largest conference in Israel for application security, and regularly draws hundreds of participants. Over 550 people attended last year!  &lt;br /&gt;
&lt;br /&gt;
But AppSecIL is not just for security experts!   &lt;br /&gt;
&lt;br /&gt;
Aimed at developers, testers, architects, product designers, and managers - anyone involved with the software lifecycle is welcome, regardless of type of software, website, mobile app, or any other type of application. &lt;br /&gt;
&lt;br /&gt;
[[image:AppSecIL_Logo_2016.png|center]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you are responsible for, or involved with:&lt;br /&gt;
* web security&lt;br /&gt;
* devops security&lt;br /&gt;
* cloud security&lt;br /&gt;
* mobile security&lt;br /&gt;
* application security&lt;br /&gt;
* software development&lt;br /&gt;
* quality assurance&lt;br /&gt;
* software maintenance or operations&lt;br /&gt;
... you should join us at AppSecIL! &lt;br /&gt;
&lt;br /&gt;
AppSec Israel 2016 will have two lecture tracks from an amazing group of speakers. We will also host a sponsors pavilion for products and services relevant to application security and developers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
= Location and Time  =&lt;br /&gt;
&lt;br /&gt;
The annual OWASP AppSec Israel 2016 conference will be held this year in The College of Management (Michlala l’Minhal), in Rishon LeZion (about 20 minutes south of Tel Aviv), on Monday, September 19th, 2016, from 9AM to 6PM. &lt;br /&gt;
&lt;br /&gt;
The address is Eli Weisel 2, Rishon LeZiyon. There is plenty of parking available, entrance is via gate 4.&lt;br /&gt;
&lt;br /&gt;
For directions and public transportation options, please see the information at this link: http://www.colman.ac.il/about/roads/Pages/default.aspx&lt;br /&gt;
&lt;br /&gt;
Please use the [https://twitter.com/hashtag/AppSecIL #AppSecIL] hashtag on Twitter.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://appsecil2016.eventbrite.com/?ref=ebtnebregn|OWASP AppSec Israel 2016]]&lt;br /&gt;
&lt;br /&gt;
= Sponsors = &lt;br /&gt;
&lt;br /&gt;
The AppSec Israel conference is proudly being sponsored by: &lt;br /&gt;
&lt;br /&gt;
{{Template:AppSec_Israel_2016_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
= Registration =&lt;br /&gt;
&lt;br /&gt;
Thanks to our generous sponsors, attending the conference is free of charge. However, advance registration is required. &lt;br /&gt;
&lt;br /&gt;
Please register here: https://appsecil2016.eventbrite.com/ .&lt;br /&gt;
&lt;br /&gt;
From there you will also be able to sign up at Sched.org, to view the conference schedule interactively, add sessions to your personal calendar, and other features. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://appsecil2016.eventbrite.com/?ref=ebtnebregn|OWASP AppSec Israel 2016]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Agenda = &lt;br /&gt;
&lt;br /&gt;
See [[AppSec_Israel_2016_Presentations|detailed list of talks here]].   &lt;br /&gt;
Please note that while most of the talks are in English, some will be given in Hebrew. Please check the details of each session to know in which language it will be.  &lt;br /&gt;
&lt;br /&gt;
New this year is a [[AppSec_Israel_2016_CTF|Capture the Flag session]], organized and sponsored by Komodo Consulting: [[AppSec_Israel_2016_CTF|click here for details]].&lt;br /&gt;
&lt;br /&gt;
The [https://appsecil2016.sched.org/ full schedule can be seen and subscribed to here]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tomer Cohen''', Head of R&amp;amp;D security, Wix.com&lt;br /&gt;
''Bot Extension - Abusing Google Chrome Extensions for Bot Attacks'' &lt;br /&gt;
* '''Amit Ashbel''', Director of Product Marketing &amp;amp; Cyber Security Evangelist, Checkmarx&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Erez Yalon''', Application Security Lead, Checkmarx&lt;br /&gt;
&lt;br /&gt;
''Could a few lines of code &amp;lt;F!#ck&amp;gt; it all up??'' &lt;br /&gt;
* '''Amit Klein''', VP Security Research, SafeBreach&lt;br /&gt;
''Crippling HTTPS with unholy PAC'' &lt;br /&gt;
* '''Martin Knobloch''', Principal Consultant, Nixu&lt;br /&gt;
''Don't Feed the Hippos!'' &lt;br /&gt;
* '''Nadav Avital''', Application Security Research Team Leader, Imperva, and &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Noam Mazor''', Security Research Engineer, Imperva  &lt;br /&gt;
&lt;br /&gt;
''Hacking HTTP/2 - New attacks on the Internet’s Next Generation Foundation'' &lt;br /&gt;
* '''Erez Metula''', Application Security Expert, AppSec Labs (Founder)&lt;br /&gt;
''Hacking RF based IoT Systems'' &lt;br /&gt;
* '''Elena Kravchenko''', ADM BU Security Lead Security &amp;amp; Trust Office, HPE Software, and &lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; '''Efrat Wasserman''', ADM Senior Program manager SRL, HPE Software&lt;br /&gt;
&lt;br /&gt;
''Integrating Security in Agile projects   (real case study)'' &lt;br /&gt;
* '''Tal Melamed''', Technical Leader, AppSec Labs&lt;br /&gt;
''Java Hurdling: Obstacles and Techniques in Java Client Penetration-testing'' &lt;br /&gt;
* '''Eli Greenbaum''', Partner, Yigal Arnon &amp;amp; Co.&lt;br /&gt;
''Law and the Israeli Cybersecurity Industry''&lt;br /&gt;
* '''Liran Tal''', R&amp;amp;D Team Leader, Hewlett Packard Enterprise&lt;br /&gt;
''NodeJS Security Done Right​ - The tips and tricks they won’t teach you in school​ '' &lt;br /&gt;
* '''Tamir Shavro''', Seeker R&amp;amp;D Manager, Synopsys&lt;br /&gt;
''Putting the &amp;quot;I&amp;quot; in Code Review - Turning Code Review Interactive'' &lt;br /&gt;
* '''Ofer Maor''', Director of Security Strategy, Synopsys&lt;br /&gt;
''Signoff or Sign-Out'' &lt;br /&gt;
* '''Or Katz''', Principal Security Researcher, Akamai &lt;br /&gt;
''The Dark Side of Search Engine Optimization'' &lt;br /&gt;
* Dr. '''Nethanel Gelernter''', Cyberpion &amp;amp; The College of Management Academic Studies&lt;br /&gt;
''The Threat of Advanced Cross-Site Search Attacks'' &lt;br /&gt;
* '''Shay Chen''', CEO, Effective Security&lt;br /&gt;
''The Unwanted Sons - Formalizing and Demonstrating WAF Bypass Methods for the REST of the Top 10'' &lt;br /&gt;
* '''Yair Amit''', CTO &amp;amp; Co-founder, Skycure&lt;br /&gt;
''The Ways Hackers Are Taking To Win The Mobile Malware Battle''&lt;br /&gt;
&lt;br /&gt;
= Sponsorships = &lt;br /&gt;
&lt;br /&gt;
Whether you have a product to showcase, offering a service, or you are recruiting, sponsoring the OWASP AppSec Israel event gets you the right exposure. This year we are expecting well over 600 attendees, including security professionals, developers, managers, and more. &lt;br /&gt;
&lt;br /&gt;
Sponsorship also helps support the OWASP community, and ensures that we can keep on making our conferences better and better. Sponsorship fees are intended to cover the costs of the conference. Since the conference is open to all and free of charge to attend, we need your support to enable us to put on a great conference.&lt;br /&gt;
&lt;br /&gt;
We are now offering Silver, Gold and Platinum sponsorship levels. There is also a cost-effective “Community Supporter” option for non-profits, government offices, small startups, and such.   &lt;br /&gt;
For more details on the available sponsorship options please see the [[AppSec_Israel_2016_Sponsorships|Conference Sponsorship page]]. &lt;br /&gt;
&lt;br /&gt;
For more details and to confirm your sponsorship, please contact [mailto:katz3112@gmail.com Or Katz].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:EventBriteRegisterButton.png|link=https://appsecil2016.eventbrite.com/?ref=ebtnebregn|OWASP AppSec Israel 2016]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= The people behind the conference  =&lt;br /&gt;
&lt;br /&gt;
OWASP AppSec Israel is made by the people who contribute their time and brains to its success. The following people are working to ensure that OWASP AppSec Israel is a success. If you feel that you also can contribute or have interesting ideas regarding the conference, please don't hesitate to contact [mailto:Avi.Douglen@owasp.org AviD] directly. &lt;br /&gt;
&lt;br /&gt;
=== Contributors  ===&lt;br /&gt;
&lt;br /&gt;
* Avi Douglen (Independent)&lt;br /&gt;
* Or Katz (Akamai)&lt;br /&gt;
* Ofer Maor (Synopsys) &lt;br /&gt;
* Erez Metula (AppSec Labs)&lt;br /&gt;
* Hemed Gur Ary (Amdocs)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Israel]] [[Category:AppSec_Israel_2016]] [[Category:OWASP_AppSec_Conference]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220712</id>
		<title>User:YossiOren</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220712"/>
				<updated>2016-08-25T10:16:36Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Yossi Oren is a senior lecturer (Assistant Professor) at the Department of Software and Information Systems Engineering in Ben Gurion University, and a member of BGU's Cyber Security Research Center. Prior to joining BGU, Yossi was a Post-Doctoral Research Scientist in the Network Security Lab at Columbia University in the City of New York and a member of the security lab at Samsung Research Israel. He holds a Ph.D. in Electrical Engineering from Tel-Aviv University, and an M.Sc. in Computer Science from the Weizmann Institute of Science.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
His research interests include secure hardware (power analysis and other hardware attacks and countermeasures; low-resource cryptographic constructions for lightweight computers) and cryptography in the real world (consumer and voter privacy in the digital era; web application security).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Also known as: Yossef Oren, יוסי אורן, יוסף אורן&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/in/yossioren Yossi Oren on LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://iss.oy.ne.ro Yossi Oren's home page]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220711</id>
		<title>User:YossiOren</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220711"/>
				<updated>2016-08-25T10:16:12Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Also known as: Yossef Oren, יוסי אורן, יוסף אורן&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/in/yossioren Yossi Oren on LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://iss.oy.ne.ro Yossi Oren's home page]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220710</id>
		<title>User:YossiOren</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=220710"/>
				<updated>2016-08-25T10:16:01Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Also known as: Yossef Oren, יוסי אורן, יוסף אורן&lt;br /&gt;
[http://www.linkedin.com/in/yossioren Yossi Oren on LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[https://iss.oy.ne.ro Yossi Oren's home page]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Video&amp;diff=109970</id>
		<title>Category:OWASP Video</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Video&amp;diff=109970"/>
				<updated>2011-05-04T13:24:33Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added link to OWASP Israel 2008&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div align=&amp;quot;center&amp;quot;&amp;gt; &amp;lt;owaspbanner/&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Advertising Ad Space Available for 2010]&amp;lt;/b&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Video Collection ==&lt;br /&gt;
&lt;br /&gt;
OWASP attempts to make videos of presentations made by our members and at our conferences concerning application security whenever possible. The slides for most of these presentations are available, linked to the conference agendas (please link them if possible!).&lt;br /&gt;
&lt;br /&gt;
== Videos ==&lt;br /&gt;
&lt;br /&gt;
===OWASP Appsec Tutorial Series===&lt;br /&gt;
OWASP Appsec Tutorial Series [http://www.youtube.com/user/AppsecTutorialSeries Click Here]   ** NEW **&lt;br /&gt;
&lt;br /&gt;
===OWASP Appsec DC 2010===&lt;br /&gt;
OWASP Appsec DC 2010 [http://vimeo.com/groups/asdc10/videos/sort:plays Click Here] ** NEW **&lt;br /&gt;
&lt;br /&gt;
===OWASP USA 2010===&lt;br /&gt;
OWASP USA 2010 [http://vimeo.com/user4863863/videos/sort:plays Click Here]   ** NEW **&lt;br /&gt;
&lt;br /&gt;
===OWASP EU 2010===&lt;br /&gt;
OWASP Stockholm Sweden 2010 [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden#tab=June_23 Click Here] and [http://www.owasp.org/index.php/OWASP_AppSec_Research_2010_-_Stockholm,_Sweden#tab=June_24 Click Here]  &lt;br /&gt;
&lt;br /&gt;
=== OWASP FROC 2010 ===&lt;br /&gt;
FROC 2010 - [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010#tab=Agenda Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP USA 2009 ===&lt;br /&gt;
APPSEC DC 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009_Schedule#tab=Talks_11.2F12 Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP EU ===&lt;br /&gt;
OWASP EU 2009 - [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland#tab=Conference_-_May_13 Here] and [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland#tab=Conference_-_May_14 Here]  &lt;br /&gt;
&lt;br /&gt;
=== OWASP Israel 2008 ===&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC) Click Here]&lt;br /&gt;
&lt;br /&gt;
=== OWASP USA 2008 ===&lt;br /&gt;
[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference Click Here]&lt;br /&gt;
&lt;br /&gt;
=== SnowFROC ===&lt;br /&gt;
;[http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009  OWASP SnowFROC from Denver, CO 2009]&lt;br /&gt;
&lt;br /&gt;
=== OWASP Minneapolis/St. Paul (OWASP MSP) ===&lt;br /&gt;
&lt;br /&gt;
Presentations from the [[Minneapolis St Paul | OWASP Minneapolis-St. Paul (OWASP MSP) chapter]] events hosted in the Twin Cities area of Minnesota are now on their own page.  Please visit [[OWASPMSP_Videos]] page for links to them.  Some of the presenters include Pravir Chandra, Bruce Schneier, Jeremiah Grossman, Ryan Barnett, and many others.&lt;br /&gt;
&lt;br /&gt;
=== Black Hat 2006 ===&lt;br /&gt;
&lt;br /&gt;
'''From Black Hat 2006:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=941077664562737284&amp;amp;q=owasp Dinis Cruz @ BlackHat 2006 with FSTV]&lt;br /&gt;
:Dinis Cruz, leader of the OWASP.NET project joins us to talk about .NET, web security tools, the future of OWASP, and Open Source Software. OWASP - 30 min - Aug 30, 2006&lt;br /&gt;
&lt;br /&gt;
=== AppSec Washington 2005 ===&lt;br /&gt;
&lt;br /&gt;
'''From the [[AppSec_Washington_2005/Agenda | 2nd U.S. OWASP Conference held Oct 11-12, 2005]] - Day 1:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2481289516847680871&amp;amp;q=owasp OWASP_Intro_DaveWichers_Key_JoeJarzombek_RonRoss.mp4]&lt;br /&gt;
:OWASP Intro: Dave Wichers - Key Note Day 1: Joe Jarzombek - Dir. of Software Assurance - DHS - Software Assurance: Considerations for Advancing a National Strategy to Secure Cyberspace &amp;amp; Ron Ross -FISMA Project Lead - NIST - Status of the Federal Information Security Management Act (FISMA) Project. OWASP - 2 hr 7 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=3853779542023264815&amp;amp;q=owasp OWASP_JackDanahy_The_Business_Case_for_Software_Security_Assurance.mp4]&lt;br /&gt;
:OWASP Jack Danahy - The Business Case for Software Security Assurance. OWASP - 1 hr 2 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=5758230888370998733&amp;amp;q=owasp OWASP_ArianEvans_Tools_SurveyProject.mp4]&lt;br /&gt;
:OWASP Arian Evans - The OWASP Tools Survey Project. OWASP - 1 hr 18 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2492965730809426450&amp;amp;q=owasp OWASP_DinizCruz_Rooting_the_CLR.mp4]&lt;br /&gt;
:OWASP Diniz Cruz - Rooting the CLR. OWASP - 1 hr 22 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-5233500471539001436&amp;amp;q=owasp OWASP_PaulBlack_RickKuhn.mp4]&lt;br /&gt;
:OWASP Paul Black - NIST - Developing a Reference Dataset &amp;amp; Rick Kuhn - NIST - Software Fault Interactions. OWASP - 1 hr 9 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=4473926180612118549&amp;amp;q=owasp OWASP_AlexSmolen_Application_Logic_Defense.mp4]&lt;br /&gt;
:OWASP Alex Smolen - Application Logic Defense. OWASP - 36 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=4379894308228900017&amp;amp;q=owasp OWASP_DanielCuthbert_Evolution_WebAppPenTest.mp4]&lt;br /&gt;
:OWASP Daniel Cuthbert - OWASP Testing Guide Lead - The Evolution Web App Pen Testing. OWASP - 1 hr 11 min - Oct 11, 2005&lt;br /&gt;
&lt;br /&gt;
'''The [[AppSec_Washington_2005/Agenda | 2nd U.S. OWASP Conference]] Day 2:'''&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-9110574247136866679&amp;amp;q=owasp OWASP_IraWinkler_Secrets_of_Superspies.mp4]&lt;br /&gt;
:OWASP Ira Winkler - Keynote Day 2: Secrets of Superspies &amp;amp; Jeremy Poteet - In the Line of Fire: Defending Highly Visible Targets. OWASP - 2 hr 2 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-5332911124544076749&amp;amp;q=owasp OWASP_JeffWilliams_OWASP_Guide_and_Membership.mp4]&lt;br /&gt;
:OWASP Jeff Williams - OWASP Development Guide and OWASP Membership Plan. OWASP - 1 hr 12 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=7947858567235952851&amp;amp;q=owasp OWASP_DinizCruz_DotNet_Tools_Project.mp4]&lt;br /&gt;
:OWASP Diniz Cruz - The .Net Tools Project. OWASP - 1 hr 15 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=2018648061521175729&amp;amp;q=owasp OWASP_MattFisher_WormsNowTargetingWebApps.mp4]&lt;br /&gt;
:OWASP Matt Fisher - Worms Now Targeting Web Applications. OWASP - 49 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=8437304318271455155&amp;amp;q=owasp OWASP_RoganDawes_AdvancedFeaturesofWebScarab.mp4]&lt;br /&gt;
:OWASP Rogan Dawes - Advanced Features of OWASP WebScarab. OWASP - 1 hr 24 min - Oct 12, 2005 &lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-2492965730809426450&amp;amp;q=owasp OWASP_JohnSteven_Building_a_Scalable_Software_Security_Practice.mp4]&lt;br /&gt;
:OWASP John Steven - Building a Scalable Software Security Practice. OWASP - 1 hr 19 min - Oct 12, 2005&lt;br /&gt;
&lt;br /&gt;
;[http://video.google.com/videoplay?docid=-1807054604513842127&amp;amp;q=owasp OWASP_GunnerPeterson_IntegratingIdentityServicesintoWebApps.mp4]&lt;br /&gt;
:OWASP Gunnar Peterson - Integrating Identity Services into Web Apps. OWASP - 35 min - Oct 12, 2005&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=109969</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=109969"/>
				<updated>2011-05-04T13:22:59Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Moved videos from Google Video to YouTube due to GV shutdown...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]&lt;br /&gt;
{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder ([ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Opening%20Words_chunk_1.wmv download video])&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_1.wmv video part 1], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_2.wmv video part 2])&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]] ([[Media:OWASP_IL_2008_Maty_Siman_Security_Code_Analysis.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] ([http://www.youtube.com/watch?v=TAAGN7Ac8Wk watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ivan%20Ristic_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|ppt]], [http://www.youtube.com/watch?v=Hl-JIxq0IrI watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Shezaf%20Trends%202008_chunk_1.wmv download video]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testin g the Tester – Measuring Quality of Security Testing]] ([[Media:OWASP_IL_2008_Ofer_Maor_Testing_The_Tester.ppt‎|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Maor%20Testing%20The%20Tester_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|ppt]], [http://www.youtube.com/watch?v=O2uOOiy8yxw watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Shai%20Chen_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|ppt]], [http://www.youtube.com/watch?v=vmzhWA6_Li4 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amir%20Herzberg.wmv download video]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2009_Conference_Turbo_Talks&amp;diff=65924</id>
		<title>OWASP Israel 2009 Conference Turbo Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2009_Conference_Turbo_Talks&amp;diff=65924"/>
				<updated>2009-07-14T18:04:22Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: /* Submitting Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
Just like last year (in fact, copy-pasted from last year), OWASP IL will include a Turbo Talk session (a.k.a. rump session), inspired by the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO conference rump sessions] and by the [http://ignite.oreilly.com/ O'Reilly IGNITE sessions].  Quoting from the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO 2007 rump session CFP]:&lt;br /&gt;
:''&amp;quot;This is intended to be an informal session in which participants give short and entertaining presentations on recent results, work in progress, and other topics of interest to the community. Presentations that are not purely technical in nature are also possible – and encouraged!&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
== Rules ==&lt;br /&gt;
Each presenter will have no more than 20 slides, which should automatically rotate after 15 seconds (for a total of under '''5 minutes per talk''').&lt;br /&gt;
&lt;br /&gt;
Topics can include:&lt;br /&gt;
&lt;br /&gt;
* Recent interesting Web Application Security results and works in progress.  General Information Security results are also welcome, as long as they are '''very''' interesting.&lt;br /&gt;
* Important announcements relevant to the Israeli Web Application Security community.&lt;br /&gt;
* Crazy ideas for a start-up (regardless of whether it already exists or not).&lt;br /&gt;
* Interesting geeky activities.&lt;br /&gt;
* Singing, dancing and shenanigans.&lt;br /&gt;
&lt;br /&gt;
Topics '''cannot''' include:&lt;br /&gt;
&lt;br /&gt;
* Shameless plugs for your new WAF, which is amazingly better than other WAFs.&lt;br /&gt;
* Politics and gambling.&lt;br /&gt;
&lt;br /&gt;
Here are some good talks for reference:&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/file/199649/ http://blip.tv/file/199649/] (topic of interest)&lt;br /&gt;
* [http://www.youtube.com/watch?v=WzJ114Masw0 http://www.youtube.com/watch?v=WzJ114Masw0] (recent result)&lt;br /&gt;
* [http://www.iacr.org/conferences/crypto2005/r/12.mov http://www.iacr.org/conferences/crypto2005/r/12.mov] (announcement)&lt;br /&gt;
* [http://www.youtube.com/watch?v=b2m7Fm1I1HU http://www.youtube.com/watch?v=b2m7Fm1I1HU] (singing, dancing and shenanigans, except there's no dancing)&lt;br /&gt;
&lt;br /&gt;
== Submitting Presentations ==&lt;br /&gt;
&lt;br /&gt;
The rump session chair is [http://iss.oy.ne.ro/ Yossi Oren].  If you want to submit a talk, please fill out [http://www.shibumi.org/eoti.htm this yet-to-be-created online form]. For comments and suggestions, please write to owasp2009rump[strudel]oy.ne.ro.&lt;br /&gt;
&lt;br /&gt;
The deadline for registration is '''September 1, 2009''' - less than a week before the conference.  We hope to have about 10 talks which should make up a very interesting hour!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2009]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2009_Conference_Turbo_Talks&amp;diff=65136</id>
		<title>OWASP Israel 2009 Conference Turbo Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2009_Conference_Turbo_Talks&amp;diff=65136"/>
				<updated>2009-07-02T15:08:07Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: New page: == Introduction == Just like last year (in fact, copy-pasted from last year), OWASP IL will include a Turbo Talk session (a.k.a. rump session), inspired by the [http://www.iacr.org/confere...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
Just like last year (in fact, copy-pasted from last year), OWASP IL will include a Turbo Talk session (a.k.a. rump session), inspired by the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO conference rump sessions] and by the [http://ignite.oreilly.com/ O'Reilly IGNITE sessions].  Quoting from the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO 2007 rump session CFP]:&lt;br /&gt;
:''&amp;quot;This is intended to be an informal session in which participants give short and entertaining presentations on recent results, work in progress, and other topics of interest to the community. Presentations that are not purely technical in nature are also possible – and encouraged!&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
== Rules ==&lt;br /&gt;
Each presenter will have no more than 20 slides, which should automatically rotate after 15 seconds (for a total of under '''5 minutes per talk''').&lt;br /&gt;
&lt;br /&gt;
Topics can include:&lt;br /&gt;
&lt;br /&gt;
* Recent interesting Web Application Security results and works in progress.  General Information Security results are also welcome, as long as they are '''very''' interesting.&lt;br /&gt;
* Important announcements relevant to the Israeli Web Application Security community.&lt;br /&gt;
* Crazy ideas for a start-up (regardless of whether it already exists or not).&lt;br /&gt;
* Interesting geeky activities.&lt;br /&gt;
* Singing, dancing and shenanigans.&lt;br /&gt;
&lt;br /&gt;
Topics '''cannot''' include:&lt;br /&gt;
&lt;br /&gt;
* Shameless plugs for your new WAF, which is amazingly better than other WAFs.&lt;br /&gt;
* Politics and gambling.&lt;br /&gt;
&lt;br /&gt;
Here are some good talks for reference:&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/file/199649/ http://blip.tv/file/199649/] (topic of interest)&lt;br /&gt;
* [http://www.youtube.com/watch?v=WzJ114Masw0 http://www.youtube.com/watch?v=WzJ114Masw0] (recent result)&lt;br /&gt;
* [http://www.iacr.org/conferences/crypto2005/r/12.mov http://www.iacr.org/conferences/crypto2005/r/12.mov] (announcement)&lt;br /&gt;
* [http://www.youtube.com/watch?v=b2m7Fm1I1HU http://www.youtube.com/watch?v=b2m7Fm1I1HU] (singing, dancing and shenanigans, except there's no dancing)&lt;br /&gt;
&lt;br /&gt;
== Submitting Presentations ==&lt;br /&gt;
&lt;br /&gt;
The rump session chair is [http://iss.oy.ne.ro/ Yossi Oren].  If you want to submit a talk, please fill out [http://www.shibumi.org/eoti.htm this yet-to-be-created online form]. For comments and suggestions, please write to [mailto:owasp2009rump@oy.ne.ro owasp2009rump@oy.ne.ro].&lt;br /&gt;
&lt;br /&gt;
The deadline for registration is '''September 1, 2009''' - less than a week before the conference.  We hope to have about 10 talks which should make up a very interesting hour!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2009]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=65135</id>
		<title>Category:Israel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:Israel&amp;diff=65135"/>
				<updated>2009-07-02T15:06:04Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Rump session&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''''For information in Hebrew refer to the [http://www.xiom.com/owasp OWASP Israel Hebrew page].'''''&lt;br /&gt;
{{Chapter Template|chaptername=Israel|extra=The chapter leader is [mailto:shezaf@xiom.com Ofer Shezaf]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-israel|emailarchives=http://lists.owasp.org/pipermail/owasp-israel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Israel&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== OWASP top 10 in Hebrew initiated ==&lt;br /&gt;
1st chapter, XSS is [http://www.xiom.com/owasp-top-10-hebrew-a1-xss available for review]. The information is available off site due to Hebrew support issues.&lt;br /&gt;
&lt;br /&gt;
== OWASP Israel 2009 ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel annual conference will be held at the Interdisciplinary Center Herzliya on Sunday, September 6th 2009.&lt;br /&gt;
&lt;br /&gt;
Call for presenters ([[OWASP_IL_CFP|details]]) and sponsors ([[OWASP_IL_Sponsorship|details]]) is now open.&lt;br /&gt;
&lt;br /&gt;
The conference will also offer a Turbo Talk session (a.k.a. rump session), featuring 5 minute talks about recent results or works in progress ([[OWASP_Israel_2009_Conference_Turbo_Talks|details]])&lt;br /&gt;
&lt;br /&gt;
For details, contact ofer@owasp.org.il&lt;br /&gt;
&lt;br /&gt;
== OWASP Israel 2009 Road map ==&lt;br /&gt;
&lt;br /&gt;
As the economic atmosphere becomes unstable, the hacking economics flourish, which makes open source initiatives such as OWASP virtually the only option we have to try to win this battle. OWASP Israel goals for 2009 are:&lt;br /&gt;
&lt;br /&gt;
* A monthly meeting! We are looking for sponsors to host this meetings and presenters to speak in them.&lt;br /&gt;
* Translating the [[OWASP top 10 Hebrew|OWASP top 10 to Hebrew]].&lt;br /&gt;
* Getting more Israelis to be involved in international OWASP projects.&lt;br /&gt;
* The OWASP Israel conference 2009 around September.&lt;br /&gt;
&lt;br /&gt;
If you have anything else on your mind, please speak up!&lt;br /&gt;
&lt;br /&gt;
== Previous OWASP Israel Conferences and Meetings ==&lt;br /&gt;
; [[OWASP_Israel_2009_05|OWASP Israel May 2009 meeting]] was held at IBM in Park Azorim in Petach-Tikva on May 7th. The presentations were:&lt;br /&gt;
* Web-Based Man-in-the-Middle Attack, Adi Sharabani, IBM ([http://blog.watchfire.com/wfblog/2009/02/active-man-in-the-middle-attacks.html more info])&lt;br /&gt;
* Automation Attacks and Counter Measures, Ofer Shezaf, Xiom ([http://www.owasp.org/images/5/58/OWASP_Israel_-_May_2009_-_Ofer_Shezaf_-_Automation_Attacks.pdf presentation])&lt;br /&gt;
: [http://www.xiom.com/owasp-meeting-7-5-2009 Full details in Hebrew]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_03|OWASP Israel March 2009 meeting]] was held at the Tel-Aviv University on March 26th, with approximately 60 attendees. The presentations were:&lt;br /&gt;
* Securing cellular web applications, Mikko Saario, Founder, OWASP Finland, Security Architect, Large Telecom Solution Provider ([[Media:OWASP_Israel_-_March_2009_-_Mikko_Saario_-_Web_Application_Security_in_the_Mobile_World.pdf‎|download]])&lt;br /&gt;
* Real world implementation of a PCI DSS compliance key management, Yaron Hakon, [http://www.2bsecure.co.il 2bsecure] ([[Media:OWASP_Israel_-_March_2009_-_Yaron_Hakon_-_PCI_key_managment.pdf‎|download]])&lt;br /&gt;
* Detecting RFI attacks, Or Katz, [http://www.breach.com Breach Security] ([[Media:OWASP_Israel_-_March_2009_-_Or_Katz_-_RFI_detection.pdf‎|download]])&lt;br /&gt;
* WAFEC 2.0 - Do WAFs deliver?, Ofer Shezaf, [http://www.xiom.com Xiom] ([[Media:OWASP_Israel_-_March_2009_-_Ofer_Shezaf_-_Why_WAFs_fail.pdf‎|download]])&lt;br /&gt;
: [http://www.xiom.com/owasp-meeting-26-3-2009 Full details in Hebrew]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2009_01|OWASP Israel January 2009 meeting]] was held at Checkpoint on January 28th, with over a 100 people attending. The presentations were:&lt;br /&gt;
* Improving Web Application Firewall testing for better deployment in production network, Gregory Fresnais from BreakingPoint, visiting us from France ([[Media:OWASP_Israel_2009_01_Gregory_Fresnais_Measuring_WAF_Performance.pdf‎|download]]) &lt;br /&gt;
* Web 2.0 Hacking, Nimrod Luria, Qrity ([[Media:OWASP_Israel_2009_01_Nimrod_Luria_Web_2.0_Security.pdf‎|download]])&lt;br /&gt;
* Wiki Security, Ofer Shezaf, Xiom ([http://www.xiom.com/research/wiki_security download])&lt;br /&gt;
: [http://www.xiom.com/owasp-meeting-28-1-2009 Full details in Hebrew]&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya|The OWASP Israel 2008 conference at the Interdisciplinary Center Herzliya (IDC)]] was held on September 14th with 250 attendees.&lt;br /&gt;
&lt;br /&gt;
; OWASP Israel at the [http://www.idc.co.il/?showproduct=31108&amp;amp;content_lang=ENG IDC Security Road Show]&lt;br /&gt;
: OWASP sponsored the IDC Security Road Show event in Israel on June 3rd 2008. Thanks for Iris Lev-Ari and Tomer Teller for the help in the OWASP booth.&lt;br /&gt;
&lt;br /&gt;
; [[OWASP_Israel_2007_Conference|OWASP Israel 2007 conference at the Interdisciplinary Center Herzliya (IDC)]]&lt;br /&gt;
: the 1st official OWASP conference in Israel, was held on Dec 3rd 2007 at the Interdisciplinary Center (IDC) Herzliya. The conference really set itself as an event you must come to if you have anything to do with application security. [ [http://picasaweb.google.com/oshezaf/OWASPIsrael2007 pictures from the conference]&lt;br /&gt;
&lt;br /&gt;
; [[8th_OWASP_IL_chapter_meeting|8th OWASP IL chapter meeting]]&lt;br /&gt;
: The meeting was held at Watchfire on Septemner 5th 2007. Watchfire also sponsored the meeting. The meeting was part of [http://www.owasp.org/index.php/OWASP_Week_September_2007 OWASP week], a Worldwide OWASP one week of conferences on privacy in the 21st Century which is in turn OWASP contribution to the [http://www.globalsecurityweek.com/ Global Security Week].&lt;br /&gt;
&lt;br /&gt;
; [[2nd_OWASP_IL_mini_conference|2nd OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya, May  21th 2007]]&lt;br /&gt;
: [[Image:OWASP_IL_IDC.jpg|right]]The event was a huge success with nearly 200 people attending and 8 companies and organizations sponsoring the event (Breach Security, Checkpoint, Hacktics, Microsoft, Zend, 2Bsecure, F5 Networks and the Efi Arazi school of Computer Science at the IDC). [ [http://picasaweb.google.com/ao.barr/OWASPIDCILMay2007 pictures from the conference] ]&lt;br /&gt;
&lt;br /&gt;
; [[6th_OWASP_IL_chapter_meeting Meeting|6th OWASP IL chapter meeting]]&lt;br /&gt;
: The meeting was held at Breach Security on January 24th 2007 and was sponsored by [http://www.breach.com Breach Security]. Nearly 50 people attended the meeting.&lt;br /&gt;
&lt;br /&gt;
; [[1st_OWASP_IL_mini_conference|OWASP IL mini conference at the Interdisciplinary Center (IDC) Herzliya, November 13th 2006]]&lt;br /&gt;
: OWASP IL and the Interdisciplinary Center Herzliya (IDC) held a half day conference on application security on Nov 13th 2006. The event marked the establishment of a new academic program on information security in the net era at IDC's Efi Arazi School of Computer Science. More than 90! people attended the conference, enjoyed professional catering and heard no less than 7 presentations.  The meeting was sponsored by Breach Security and Applicure.&lt;br /&gt;
&lt;br /&gt;
; [[4th_OWASP_IL_chapter_meeting|4th OWASP IL chapter meeting]]&lt;br /&gt;
The meeting was help at Breach Security on July 26th 2005 and was sponsored by [http://www.breach.com Breach Security].&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=56789</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=56789"/>
				<updated>2009-03-16T17:20:28Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added Herzberg video&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]&lt;br /&gt;
{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder ([ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Opening%20Words_chunk_1.wmv download video])&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_1.wmv video part 1], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_2.wmv video part 2])&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]] ([[Media:OWASP_IL_2008_Maty_Siman_Security_Code_Analysis.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] ([http://video.google.com/videoplay?docid=7068511159346934140 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ivan%20Ristic_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|ppt]], [http://video.google.com/videoplay?docid=9146476705062425935 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Shezaf%20Trends%202008_chunk_1.wmv download video]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testin g the Tester – Measuring Quality of Security Testing]] ([[Media:OWASP_IL_2008_Ofer_Maor_Testing_The_Tester.ppt‎|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Maor%20Testing%20The%20Tester_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|ppt]], [http://video.google.com/videoplay?docid=3492299259825686414 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Shai%20Chen_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|ppt]], [http://video.google.com/videoplay?docid=6757165220729025774 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amir%20Herzberg.wmv download video]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=56775</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=56775"/>
				<updated>2009-03-16T13:57:31Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added 3 video links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Israel]]&lt;br /&gt;
{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder ([ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Opening%20Words_chunk_1.wmv download video])&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_1.wmv video part 1], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amichai%20Sholman_chunk_2.wmv video part 2])&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]] ([[Media:OWASP_IL_2008_Maty_Siman_Security_Code_Analysis.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] ([http://video.google.com/videoplay?docid=7068511159346934140 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ivan%20Ristic_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|ppt]], [http://video.google.com/videoplay?docid=9146476705062425935 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Shezaf%20Trends%202008_chunk_1.wmv download video]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testin g the Tester – Measuring Quality of Security Testing]] ([[Media:OWASP_IL_2008_Ofer_Maor_Testing_The_Tester.ppt‎|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Ofer%20Maor%20Testing%20The%20Tester_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|ppt]], [http://video.google.com/videoplay?docid=3492299259825686414 watch video], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Shai%20Chen_chunk_1.wmv download video])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|ppt]], [ftp://ftp.idc.ac.il/csvideos/OWASP%2008/Amir%20Herzberg.wmv download video]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:UnknownMalcodeDetection_OWASP-IL-08.pdf&amp;diff=40761</id>
		<title>File:UnknownMalcodeDetection OWASP-IL-08.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:UnknownMalcodeDetection_OWASP-IL-08.pdf&amp;diff=40761"/>
				<updated>2008-09-22T04:18:13Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40760</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40760"/>
				<updated>2008-09-22T04:16:50Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt‎|download ppt)]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]]&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|download ppt]]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|download ppt]])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|download ppt]]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_IL_2008_Yossi_Oren_APEG.ppt&amp;diff=40068</id>
		<title>File:OWASP IL 2008 Yossi Oren APEG.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_IL_2008_Yossi_Oren_APEG.ppt&amp;diff=40068"/>
				<updated>2008-09-15T17:43:55Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40064</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40064"/>
				<updated>2008-09-15T17:32:04Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:AppSecEU08-BeyondGoogleHacking-AmichaiShulman.ppt|download ppt)]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]]&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|download ppt]]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]]&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|download ppt]])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|download ppt]]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]]&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]]&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt‎|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt‎|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=39497</id>
		<title>User:YossiOren</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:YossiOren&amp;diff=39497"/>
				<updated>2008-09-12T15:01:01Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: New page: [http://www.linkedin.com/in/yossioren Yossi Oren on LinkedIn]  [http://iss.oy.ne.ro Yossi Oren's home page]&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.linkedin.com/in/yossioren Yossi Oren on LinkedIn]&lt;br /&gt;
&lt;br /&gt;
[http://iss.oy.ne.ro Yossi Oren's home page]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=39460</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=39460"/>
				<updated>2008-09-12T12:36:44Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== Time and Location ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be held on September 14th at the Interdisciplinary Center Herzliya from 8:30 to 17:00. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
You can find the IDC on&lt;br /&gt;
[http://local.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=%D7%94%D7%9E%D7%A8%D7%9B%D7%96+%D7%94%D7%91%D7%99%D7%9F+%D7%AA%D7%97%D7%95%D7%9E%D7%99+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+%D7%94%D7%A8%D7%A6%D7%9C%D7%99%D7%94,+Israel&amp;amp;sll=32.166567,34.812605&amp;amp;sspn=0.007974,0.019312&amp;amp;ie=UTF8&amp;amp;cd=1&amp;amp;geocode=FbD26gEdeo0TAg&amp;amp;ll=32.177047,34.835844&amp;amp;spn=0.007973,0.019312&amp;amp;z=16&amp;amp;iwloc=addr  Google map] or use the [http://portal.idc.ac.il/he/Main/about_idc/campus_tour/Pages/MapsDirections.aspx instructions] on the IDC web site. Signs at the Campus will lead you the conference halls.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
The conference is '''free and open to all''', but please register by sending an e-mail to me at ofer@shezaf.com. We need to know how many people will arrive in order to be prepared.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]] &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]]&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]]&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]]&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]]&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]]&amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]]&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework &amp;lt;BR&amp;gt;Erez Metula, 2Bsecure]]&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]]&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]]&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG)&lt;br /&gt;
* Avi Weissman, הצגת הפורום הישראלי לאבטחת מידע&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning&lt;br /&gt;
* Yaniv Meron, UTF7 Evasion&lt;br /&gt;
* Avi Douglan, CAPTCHA&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38026</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38026"/>
				<updated>2008-09-02T11:47:09Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Added that the conference is free - people weren't sure&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be held on September 14th at the Interdisciplinary Center Herzliya. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
== Registration ==&lt;br /&gt;
&lt;br /&gt;
The conference is '''free and open to all''', but please register by sending an e-mail to me at ofer@shezaf.com. We need to know how many people will arrive in order to be prepared.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
(Not final, minor changes and additions possible)&lt;br /&gt;
&lt;br /&gt;
{|   class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with   [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]]   V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-   style=&amp;quot;background-color:#000000;font-size:11pt;font-weight:bold;color:#FFFFFF&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;315&amp;quot;   height=&amp;quot;16&amp;quot; | Title&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;156&amp;quot; | Presentation&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;91&amp;quot; | Copmany&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | .NET Framework   rootkits - backdoors inside your Framework&lt;br /&gt;
&lt;br /&gt;
 |   Erez Metula&lt;br /&gt;
&lt;br /&gt;
 |   2Bsecure&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | No More   Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler   Using Traffic Profiling&lt;br /&gt;
&lt;br /&gt;
 |   Ivan Ristic&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Trends in Web   Hacking: What's hot in 2008&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Shezaf&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | Web Application   Security and Search Engines – Beyond Google Hacking&lt;br /&gt;
&lt;br /&gt;
 |   Amichai Shulman&lt;br /&gt;
&lt;br /&gt;
 |   Imperva&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | GreenSQL - an   open source database security gateway&lt;br /&gt;
&lt;br /&gt;
 |   Yuli Stremovsky&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | eVoting&lt;br /&gt;
&lt;br /&gt;
 |   Dr. Alon Roser&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Black Box vs.   White Box - pros and cons&lt;br /&gt;
&lt;br /&gt;
 |   Adi Sharabani  &amp;amp; Omri Weisman&lt;br /&gt;
&lt;br /&gt;
 |   Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Testing the   Tester – Measuring Quality of Security Testing&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Maor&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Achilles’ heel   – Hacking Through Java Protocols&lt;br /&gt;
&lt;br /&gt;
 |   Shai Chen&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Defending   against Phishing without Client-side Code&lt;br /&gt;
&lt;br /&gt;
 |   Prof. Amir Herzberg&lt;br /&gt;
&lt;br /&gt;
 |   Bar Ilan Univeristy&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | Automated   Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications&lt;br /&gt;
&lt;br /&gt;
 |   Ronen Bachar&lt;br /&gt;
&lt;br /&gt;
 |   IBM/Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Application   Security - The code analysis way&lt;br /&gt;
&lt;br /&gt;
 |   Maty Siman&lt;br /&gt;
&lt;br /&gt;
 |   Checkmarx&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | AJAX - new   technologies new threats&lt;br /&gt;
&lt;br /&gt;
 |   Dr. David Movshovitz&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;16&amp;quot; | Korset:   Code-based Intrusion Detection System for Linux&lt;br /&gt;
&lt;br /&gt;
 |   Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that the [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] is still open for submissions.&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38025</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=38025"/>
				<updated>2008-09-02T09:50:18Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: help-&amp;gt;held&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be held on September 14th at the Interdisciplinary Center Herzliya. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
(Not final, minor changes and additions possible)&lt;br /&gt;
&lt;br /&gt;
{|   class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with   [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]]   V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-   style=&amp;quot;background-color:#000000;font-size:11pt;font-weight:bold;color:#FFFFFF&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;315&amp;quot;   height=&amp;quot;16&amp;quot; | Title&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;156&amp;quot; | Presentation&lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;91&amp;quot; | Copmany&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | .NET Framework   rootkits - backdoors inside your Framework&lt;br /&gt;
&lt;br /&gt;
 |   Erez Metula&lt;br /&gt;
&lt;br /&gt;
 |   2Bsecure&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | No More   Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler   Using Traffic Profiling&lt;br /&gt;
&lt;br /&gt;
 |   Ivan Ristic&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Trends in Web   Hacking: What's hot in 2008&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Shezaf&lt;br /&gt;
&lt;br /&gt;
 |   Breach&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | Web Application   Security and Search Engines – Beyond Google Hacking&lt;br /&gt;
&lt;br /&gt;
 |   Amichai Shulman&lt;br /&gt;
&lt;br /&gt;
 |   Imperva&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | GreenSQL - an   open source database security gateway&lt;br /&gt;
&lt;br /&gt;
 |   Yuli Stremovsky&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | eVoting&lt;br /&gt;
&lt;br /&gt;
 |   Dr. Alon Roser&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Black Box vs.   White Box - pros and cons&lt;br /&gt;
&lt;br /&gt;
 |   Adi Sharabani  &amp;amp; Omri Weisman&lt;br /&gt;
&lt;br /&gt;
 |   Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Testing the   Tester – Measuring Quality of Security Testing&lt;br /&gt;
&lt;br /&gt;
 |   Ofer Maor&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Achilles’ heel   – Hacking Through Java Protocols&lt;br /&gt;
&lt;br /&gt;
 |   Shai Chen&lt;br /&gt;
&lt;br /&gt;
 |   Hacktics&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Defending   against Phishing without Client-side Code&lt;br /&gt;
&lt;br /&gt;
 |   Prof. Amir Herzberg&lt;br /&gt;
&lt;br /&gt;
 |   Bar Ilan Univeristy&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;30&amp;quot; | Automated   Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications&lt;br /&gt;
&lt;br /&gt;
 |   Ronen Bachar&lt;br /&gt;
&lt;br /&gt;
 |   IBM/Watchfire&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | Application   Security - The code analysis way&lt;br /&gt;
&lt;br /&gt;
 |   Maty Siman&lt;br /&gt;
&lt;br /&gt;
 |   Checkmarx&lt;br /&gt;
|-   style=&amp;quot;background-color:#D8D8D8;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;15&amp;quot; | AJAX - new   technologies new threats&lt;br /&gt;
&lt;br /&gt;
 |   Dr. David Movshovitz&lt;br /&gt;
&lt;br /&gt;
 |   IDC&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;  valign=&amp;quot;top&amp;quot;&lt;br /&gt;
&lt;br /&gt;
| height=&amp;quot;16&amp;quot; | Korset:   Code-based Intrusion Detection System for Linux&lt;br /&gt;
&lt;br /&gt;
 |   Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
 |   &amp;amp;nbsp;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Note that the [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] is still open for submissions.&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=34744</id>
		<title>OWASP IL Sponsorship</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_Sponsorship&amp;diff=34744"/>
				<updated>2008-07-26T21:50:30Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP is an open source organization. While our activities are free for all, we can use your help to make our activities better. We are open to any sponsorship ideas that you may have. This are some simple ways in which you can help us:&lt;br /&gt;
&lt;br /&gt;
== Commercial Sponsoring an OWASP IL conference ==&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| OWASP Israeli chapter holds a conference usually twice a year usually together with the Efi Arazi Computer Science School at the the Interdisciplinary Center (IDC) Herzliya. These [http://www.owasp.org.il conferences] where very successful and a large number of people.&lt;br /&gt;
&lt;br /&gt;
We encourage company's to sponsor our conferences and help pay for such expenses such as refreshments, photography, video etc. The conferences are not commercial and the cost goes directly to cover expenses. Actually we just split the bills between the sponsors, but not more than $500 for each sponsor. At OWASP Israel 2007, the actual sum was $300 per sponsor.&lt;br /&gt;
&lt;br /&gt;
'''Past sponsors include Checkpoint, Microsoft, F5, Breach Security, Hacktics, 2bsecure, GamaSec, Applicure &amp;amp; Zend'''&lt;br /&gt;
=== What do you get for sponsoring ===&lt;br /&gt;
* Many thanks, and hopefully a very good feeling of helping the community.&lt;br /&gt;
&lt;br /&gt;
* A table top style mini booth where you can put up a &amp;quot;roll up&amp;quot; poster or two and hand out your brochures and freebies.&lt;br /&gt;
&lt;br /&gt;
* Logo on the conference page.&lt;br /&gt;
&lt;br /&gt;
* If there is something specific that you may want else and is within the OWASP guideline tell me.&lt;br /&gt;
&lt;br /&gt;
=== What you don't get ===&lt;br /&gt;
* List of people registering. You can collect yourself in the booth, for example by offering a prize for people filling in details.&lt;br /&gt;
&lt;br /&gt;
* A lecture for money. The conference program is strictly selected on professional terms.&lt;br /&gt;
| https://www.owasp.org/images/9/96/OWASP_IL_Conf_graphics_small.jpg &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What do we need your money for ===&lt;br /&gt;
&lt;br /&gt;
OWASP is very strictly non for profit. We take your money to help make our events more compelling to the audience while striving to make them free for participants. We want more people to come to our events so we can educate them about making applications more secure.&lt;br /&gt;
&lt;br /&gt;
We use the money collected from sponsors for things such as:&lt;br /&gt;
&lt;br /&gt;
* '''Lecture videos''' - filming presentations enables them to be available also to people who cannot make it to the conference.&lt;br /&gt;
&lt;br /&gt;
* '''Refreshments''' - we want to keep people a long time, and we certainly bring good and interesting speakers, yet we don't want people to go home when they become hungry.&lt;br /&gt;
&lt;br /&gt;
* '''Name tags''' - we feel that getting to know each other is important and name tags make it possible.&lt;br /&gt;
&lt;br /&gt;
* '''Promotion''' - Up to now our events are propagating by word of mouth. We would like to get to a wider audience by advertising our events.&lt;br /&gt;
&lt;br /&gt;
* '''Printed Materials''' - We are not very keen on killing trees, but some people learn more from actual printed paper. We would like to start handing out printed materials in out conferences.&lt;br /&gt;
&lt;br /&gt;
By the way, if you feel that you can contribute to any of these in anyway besides money, we will be happy to here about it.&lt;br /&gt;
&lt;br /&gt;
=== What should you prepare as a sponsor ===&lt;br /&gt;
As a sponsor, you are not oblidged to do anything. Sponsorship can be a philanthropy. However in order to take advantage of the benefits listed above, we recommend the following:&lt;br /&gt;
&lt;br /&gt;
* Send us a logo file to put on the conference web page.&lt;br /&gt;
&lt;br /&gt;
* Prepare a roll up type poster or equivalent for your table top booth.&lt;br /&gt;
&lt;br /&gt;
* Prepare brochures for handling out to conference attendees.&lt;br /&gt;
&lt;br /&gt;
* You might also want hold a sweepstake between people who fill in their details in order to collect leads. We will be happy to announce the prize on the conference page.&lt;br /&gt;
&lt;br /&gt;
* Come 30 minutes before the conference starts to setup your booth.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
for further details contact [mailto:ofer@shezaf.com me].&lt;br /&gt;
&lt;br /&gt;
== Non for Profit/Barter Sponsorship of OWASP IL Conferences ==&lt;br /&gt;
&lt;br /&gt;
We are happy to allow any information security related non for profit organization to present at our conference expo. You will get, for free, the same benefits that the commercial vendors get. The only condition is that if you hold similar events we would like to present at those events in return.&lt;br /&gt;
&lt;br /&gt;
We extend the same type of barter to commercial organizations that hold events. If you organize an information security related event, we would let you promote it in our expo in return for having presence in your event.&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:ofer@shezaf.com me] for further details.&lt;br /&gt;
&lt;br /&gt;
== Hosting a meeting ==&lt;br /&gt;
&lt;br /&gt;
We also host regular meetings and look for companies to host of sponsor these meetings. A company that hosts such a meeting is responsible for a meeting location and the refreshments. We need a room that can host up to 50 people. Pizza and drinks are the common refreshments, but alternatives are also OK. Keep in mind that food should be Kosher.&lt;br /&gt;
&lt;br /&gt;
If you want to host such a meeting, contact me [mailto:ofer@shezaf.com me].&lt;br /&gt;
&lt;br /&gt;
== OWASP Membership ==&lt;br /&gt;
&lt;br /&gt;
In addition to sponsoring OWASP Israel, you can also join OWASP as a member. For details, please refer to [http://www.owasp.org/index.php/Membership this page].&lt;br /&gt;
[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Israel_Meetings&amp;diff=34743</id>
		<title>Category:OWASP Israel Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Israel_Meetings&amp;diff=34743"/>
				<updated>2008-07-26T21:45:53Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: New page: &amp;lt;br&amp;gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_IL_CFP&amp;diff=34742</id>
		<title>OWASP IL CFP</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_IL_CFP&amp;diff=34742"/>
				<updated>2008-07-26T21:40:19Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== OWASP IL 2008 CFP schedule ==&lt;br /&gt;
&lt;br /&gt;
The deadline for submissions for OWASP IL 2008 is Monday, August 4th 2008. We will be informing submitters on acceptance starting on the 4th and no later than August 15th.&lt;br /&gt;
&lt;br /&gt;
== Submitting presentations ==&lt;br /&gt;
&lt;br /&gt;
We always welcome presentations, if for a specific event or generally for a future meeting. We favor presentations on web application security and accept from time to time presentations on related subjects. For conferences we may select an exceptional presentation about information security in general.&lt;br /&gt;
&lt;br /&gt;
If you want to submit, please send an e-mail to ofer@shezaf.com with the following details:&lt;br /&gt;
&lt;br /&gt;
* The presentation title.&lt;br /&gt;
* An abstract (couple of paragraphs).&lt;br /&gt;
* Estimated length.&lt;br /&gt;
* A short bio of the presenter.&lt;br /&gt;
&lt;br /&gt;
We prefer submissions that include more detailed information such as actual slides, a paper or an outline. In certain cases we would ask for such information since we feel the abstract does not provide enough information for evaluating the presentation.&lt;br /&gt;
&lt;br /&gt;
== Editorial committee ==&lt;br /&gt;
&lt;br /&gt;
We have established a content committee to review the presentations. The committee would select the presentations and in some cases will work with presenters to ensure that a presentation fits an OWASP conference. Examples of such cases are:&lt;br /&gt;
&lt;br /&gt;
* From past experience we know that some presenters have very interesting things to say, but lack the experience to build a short and compelling presentation for a large audience.  &lt;br /&gt;
* At times we like the presentation but would like to ensure that it is not commercial.&lt;br /&gt;
* When selecting a subject related to web application security we may want to help the presenter in focusing on the web application security aspect of his presentation.&lt;br /&gt;
&lt;br /&gt;
Naturally in such cases we would need the full presentation well in advance.&lt;br /&gt;
&lt;br /&gt;
== Preparing for the event == &lt;br /&gt;
&lt;br /&gt;
In any case we will require the presentation to be available to us prior to the event (specific date would be set for each event). On the day of the event please be at the conference at least 45 minutes before your presentation.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=34741</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=34741"/>
				<updated>2008-07-26T21:39:33Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
== General ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference will be help on September 14th at the Interdisciplinary Center Herzliya. This time we are raising the bar and will be holding a full day '''two tracks''' event. The tracks would be split according by level: a beginners track and an experts track.&lt;br /&gt;
&lt;br /&gt;
== Call for participation ==&lt;br /&gt;
&lt;br /&gt;
Being a community event, we are staring a call for involvement, which means it is the time to speak up if you want to:&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_IL_CFP|Call for presenters]]&lt;br /&gt;
: The deadline for submissions for OWASP IL 2008 is '''Monday, August 4th 2008'''. We will be informing submitters on acceptance starting on the 4th and no later than August 15th&lt;br /&gt;
* [[OWASP_Israel_2008_Conference_Turbo_Talks|Turbo Talk (Rump) Session]] - a new feature in this conference, consisting of a series of 5-minute talks.&lt;br /&gt;
: The deadline for submissions for the rump session is '''Monday, September 8, 2008'''. &lt;br /&gt;
* [[OWASP IL Sponsorship|Call for sponsors]]&lt;br /&gt;
* Help in organizing&lt;br /&gt;
* Otherwise participate (plenty of time for that, but if you know you will come, speak up)&lt;br /&gt;
&lt;br /&gt;
'''This is also a good time to raise other ideas you have regarding the conference'''. Many of you have been to previous conferences and have great ideas, so don't be shy and speak up.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
The [[OWASP_IL_CFP|CFP]] is underway and the program would be published by mid August. &lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Daniel Kallner&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Israel_2008&amp;diff=34739</id>
		<title>Category:OWASP Israel 2008</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Israel_2008&amp;diff=34739"/>
				<updated>2008-07-26T21:13:27Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: New page: Category:OWASP Israel Meetings&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:OWASP Israel Meetings]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_Turbo_Talks&amp;diff=34738</id>
		<title>OWASP Israel 2008 Conference Turbo Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_Turbo_Talks&amp;diff=34738"/>
				<updated>2008-07-26T21:08:54Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This year OWASP IL will include for the first time a Turbo Talk session (a.k.a. rump session), inspired by the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO conference rump sessions] and by the [http://ignite.oreilly.com/ O'Reilly IGNITE sessions].  Quoting from the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO 2007 rump session CFP]:&lt;br /&gt;
:''&amp;quot;This is intended to be an informal session in which participants give short and entertaining presentations on recent results, work in progress, and other topics of interest to the community. Presentations that are not purely technical in nature are also possible – and encouraged!&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
== Rules ==&lt;br /&gt;
Each presenter will have no more than 20 slides, which should automatically rotate after 15 seconds (for a total of under '''5 minutes per talk''').&lt;br /&gt;
&lt;br /&gt;
Topics can include:&lt;br /&gt;
&lt;br /&gt;
* Recent interesting Web Application Security results and works in progress.  General Information Security results are also welcome, as long as they are '''very''' interesting.&lt;br /&gt;
* Important announcements relevant to the Israeli Web Application Security community.&lt;br /&gt;
* Crazy ideas for a start-up (regardless of whether it already exists or not).&lt;br /&gt;
* Interesting geeky activities.&lt;br /&gt;
* Singing, dancing and shenanigans.&lt;br /&gt;
&lt;br /&gt;
Topics '''cannot''' include:&lt;br /&gt;
&lt;br /&gt;
* Shameless plugs for your new WAF, which is amazingly better than other WAFs.&lt;br /&gt;
* Politics and gambling.&lt;br /&gt;
&lt;br /&gt;
Here are some good talks for reference:&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/file/199649/ http://blip.tv/file/199649/] (topic of interest)&lt;br /&gt;
* [http://www.youtube.com/watch?v=WzJ114Masw0 http://www.youtube.com/watch?v=WzJ114Masw0] (recent result)&lt;br /&gt;
* [http://www.iacr.org/conferences/crypto2005/r/12.mov http://www.iacr.org/conferences/crypto2005/r/12.mov] (announcement)&lt;br /&gt;
* [http://www.youtube.com/watch?v=b2m7Fm1I1HU http://www.youtube.com/watch?v=b2m7Fm1I1HU] (singing, dancing and shenanigans, except there's no dancing)&lt;br /&gt;
&lt;br /&gt;
== Submitting Presentations ==&lt;br /&gt;
&lt;br /&gt;
The rump session chair is [http://iss.oy.ne.ro/ Yossi Oren].  If you want to submit a talk, please fill out [http://spreadsheets.google.com/viewform?key=piN5RsLRYCElGkkC8da17Ew&amp;amp;hl=en this online form]. For comments and suggestions, please write to [mailto:owasp2008rump@oy.ne.ro owasp2008rump@oy.ne.ro].&lt;br /&gt;
&lt;br /&gt;
The deadline for registration is '''September 8, 2008''' - less than a week before the conference.  We hope to have about 10 talks which should make up a very interesting hour!&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_Turbo_Talks&amp;diff=34480</id>
		<title>OWASP Israel 2008 Conference Turbo Talks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_Turbo_Talks&amp;diff=34480"/>
				<updated>2008-07-23T08:28:06Z</updated>
		
		<summary type="html">&lt;p&gt;YossiOren: Fixed links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
&lt;br /&gt;
This year OWASP IL will include for the first time a Turbo Talk session (a.k.a. rump session), inspired by the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO conference rump sessions] and by the [http://ignite.oreilly.com/ O'Reilly IGNITE sessions].  Quoting from the [http://www.iacr.org/conferences/crypto2007/rump.html CRYPTO 2007 rump session CFP]:&lt;br /&gt;
:''&amp;quot;This is intended to be an informal session in which participants give short and entertaining presentations on recent results, work in progress, and other topics of interest to the community. Presentations that are not purely technical in nature are also possible – and encouraged!&amp;quot;''&lt;br /&gt;
&lt;br /&gt;
== Rules ==&lt;br /&gt;
Each presenter will have no more than 20 slides, which should automatically rotate after 15 seconds (for a total of under '''5 minutes per talk''').&lt;br /&gt;
&lt;br /&gt;
Topics can include:&lt;br /&gt;
&lt;br /&gt;
* Recent interesting Web Application Security results and works in progress.  General Information Security results are also welcome, as long as they are '''very''' interesting.&lt;br /&gt;
* Important announcements relevant to the Israeli Web Application Security community.&lt;br /&gt;
* Crazy ideas for a start-up (regardless of whether it already exists or not).&lt;br /&gt;
* Interesting geeky activities.&lt;br /&gt;
* Singing, dancing and shenanigans.&lt;br /&gt;
&lt;br /&gt;
Topics '''cannot''' include:&lt;br /&gt;
&lt;br /&gt;
* Shameless plugs for your new WAF, which is amazingly better than other WAFs.&lt;br /&gt;
* Politics and gambling.&lt;br /&gt;
&lt;br /&gt;
Here are some good talks for reference:&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/file/199649/ http://blip.tv/file/199649/] (topic of interest)&lt;br /&gt;
* [http://www.youtube.com/watch?v=WzJ114Masw0 http://www.youtube.com/watch?v=WzJ114Masw0] (recent result)&lt;br /&gt;
* [http://www.iacr.org/conferences/crypto2005/r/12.mov http://www.iacr.org/conferences/crypto2005/r/12.mov] (announcement)&lt;br /&gt;
* [http://www.youtube.com/watch?v=b2m7Fm1I1HU http://www.youtube.com/watch?v=b2m7Fm1I1HU] (singing, dancing and shenanigans, except there's no dancing)&lt;br /&gt;
&lt;br /&gt;
== Submitting Presentations ==&lt;br /&gt;
&lt;br /&gt;
The rump session chair is [http://iss.oy.ne.ro/ Yossi Oren].  If you want to submit a talk, please fill out [http://spreadsheets.google.com/viewform?key=piN5RsLRYCElGkkC8da17Ew&amp;amp;hl=en this online form]. For comments and suggestions, please write to [mailto:owasp2008rump@oy.ne.ro owasp2008rump@oy.ne.ro].&lt;br /&gt;
&lt;br /&gt;
The deadline for registration is '''September 8, 2008''' - less than a week before the conference.  We hope to have about 10 talks which should make up a very interesting hour!&lt;/div&gt;</summary>
		<author><name>YossiOren</name></author>	</entry>

	</feed>