<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Marco_Morana</id>
		<title>Marco Morana - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Marco_Morana"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;action=history"/>
		<updated>2026-04-15T22:36:06Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234854&amp;oldid=prev</id>
		<title>Marco-cincy at 00:06, 3 November 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234854&amp;oldid=prev"/>
				<updated>2017-11-03T00:06:15Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 00:06, 3 November 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot; &gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;http&lt;/del&gt;://&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;iac&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;dtic&lt;/del&gt;.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;mil&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;iatac&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;download&lt;/del&gt;/&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;security&lt;/del&gt;.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;https&lt;/ins&gt;://&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;resources&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;sei&lt;/ins&gt;.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;cmu.edu&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;asset_files&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;WhitePaper&lt;/ins&gt;/&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;2006_019_001_52113&lt;/ins&gt;.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234084&amp;oldid=prev</id>
		<title>Marco-cincy at 02:08, 4 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234084&amp;oldid=prev"/>
				<updated>2017-10-04T02:08:50Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 02:08, 4 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l10&quot; &gt;Line 10:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 10:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[http://www.owasp.org/index.php/Application_Threat_Modeling application threat modeling methodology] of the [http://www.lulu.com/items/volume_64/5678000/5678680/13/print/5678680.pdf OWASP secure coding guide] the [http://www.owasp.org/index.php/Testing_Guide_Introduction introduction to the security testing methodology] the [http://www.owasp.org/index.php/Testing_Guide OWASP security testing guide] the [http://www.owasp.org/index.php/Category:OWASP_Source_Code_Review_OWASP_Projects_Project OWASP Source Code Review Project] and [http://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project] and most recently the OWASP [https://www.owasp.org/index.php/Global_Initiatives/Cyber_Security_Pre-accelerator_Initiative cyber-security startup accelerator initiative]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[http://www.owasp.org/index.php/Application_Threat_Modeling application threat modeling methodology] of the [http://www.lulu.com/items/volume_64/5678000/5678680/13/print/5678680.pdf OWASP secure coding guide] the [http://www.owasp.org/index.php/Testing_Guide_Introduction introduction to the security testing methodology] the [http://www.owasp.org/index.php/Testing_Guide OWASP security testing guide] the [http://www.owasp.org/index.php/Category:OWASP_Source_Code_Review_OWASP_Projects_Project OWASP Source Code Review Project] and [http://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project] and most recently the OWASP [https://www.owasp.org/index.php/Global_Initiatives/Cyber_Security_Pre-accelerator_Initiative cyber-security startup accelerator initiative]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana current effort &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; or &lt;/del&gt;OWASP is &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;to lead the effort for revising &lt;/del&gt;the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana current effort &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;for &lt;/ins&gt;OWASP is &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;work on &lt;/ins&gt;the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234071&amp;oldid=prev</id>
		<title>Marco-cincy at 18:30, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234071&amp;oldid=prev"/>
				<updated>2017-10-03T18:30:58Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:30, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Bio - &amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;OWASP Bio - &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;(Updated October 2017)&lt;/ins&gt;&amp;lt;br&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana volunteers for the OWASP organization as project leader of the&amp;#160; [https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] and is currently a member of OWASP Tampa, Florida Chapter in USA. Previously he was member of [https://www.owasp.org/index.php/London OWASP London U.K. chapter] and the founder of the [https://www.owasp.org/index.php/Cincinnati OWASP chapter in Cincinnati U.S.A.]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana volunteers for the OWASP organization as project leader of the&amp;#160; [https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] and is currently a member of OWASP Tampa, Florida Chapter in USA. Previously he was member of [https://www.owasp.org/index.php/London OWASP London U.K. chapter] and the founder of the [https://www.owasp.org/index.php/Cincinnati OWASP chapter in Cincinnati U.S.A.]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234070&amp;oldid=prev</id>
		<title>Marco-cincy at 18:30, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234070&amp;oldid=prev"/>
				<updated>2017-10-03T18:30:10Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:30, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot; &gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana volunteers for the OWASP organization as project leader of the&amp;#160; [https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] and is currently a member of OWASP Tampa, Florida Chapter in USA. Previously he was member of [https://www.owasp.org/index.php/London OWASP London U.K. chapter] and the founder of the [https://www.owasp.org/index.php/Cincinnati OWASP chapter in Cincinnati U.S.A.]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana volunteers for the OWASP organization as project leader of the&amp;#160; [https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] and is currently a member of OWASP Tampa, Florida Chapter in USA. Previously he was member of [https://www.owasp.org/index.php/London OWASP London U.K. chapter] and the founder of the [https://www.owasp.org/index.php/Cincinnati OWASP chapter in Cincinnati U.S.A.]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In his current professional role, Dr. Morana works as SVP at large Financial Institution where he is responsible for the architecture risk analysis and threat modelling program execution and application security strategy including leading initiatives for mitigating the risks of sophisticated cyber-threats targeting web and mobile applications. He was previously (2007-2011) VP and technology information security officer with the same FI in North America. In his distinguished 15+ years of career in application security, Dr. Morana held roles in different companies as security consultant, application security architect, professional trainer and program manager. As cyber-security technologist, Dr. Morana most important contributions to cyber-security is the invention of the first secure email plug-in using SMIME protocol that was patented for NASA in 1996. Dr. Morana is technical advisor of start-ups [https://www.mindedsecurity.com Minded Security UK LTD] based in London, UK and [https://www.noknok.com/ Nok Nok Labs Inc] and [http://www.confer.net Confer Technologies] in USA. Dr Morana was a mentor of early stage cyber-security start-ups at [http://level39.co Level 39] and [https://cylonlab.com CyLon Lab] accelerators in London UK. Dr. Morana has been the advisor of the EU funded project on cyber-crime research [https://www.cyberroad-project.eu CyberROAD] and was invited to provide lectures at the PhD Summer School on Computer Security &amp;amp; Privacy at [https://comsec.diee.unica.it/summer-school/lecturers.html University of Cagliari] Italy&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In his current professional role, Dr. Morana works as SVP at large Financial Institution where he is responsible for the architecture risk analysis and threat modelling program execution and application security strategy including leading initiatives for mitigating the risks of sophisticated cyber-threats targeting web and mobile applications. He was previously (2007-2011) VP and technology information security officer with the same FI in North America. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In his distinguished 15+ years of career in application security, Dr. Morana held roles in different companies as security consultant, application security architect, professional trainer and program manager. As cyber-security technologist, Dr. Morana most important contributions to cyber-security is the invention of the first secure email plug-in using SMIME protocol that was patented for NASA in 1996. Dr. Morana is technical advisor of start-ups [https://www.mindedsecurity.com Minded Security UK LTD] based in London, UK and [https://www.noknok.com/ Nok Nok Labs Inc] and [http://www.confer.net Confer Technologies] in USA. Dr Morana was a mentor of early stage cyber-security start-ups at [http://level39.co Level 39] and [https://cylonlab.com CyLon Lab] accelerators in London UK. Dr. Morana has been the advisor of the EU funded project on cyber-crime research [https://www.cyberroad-project.eu CyberROAD] and was invited to provide lectures at the PhD Summer School on Computer Security &amp;amp; Privacy at [https://comsec.diee.unica.it/summer-school/lecturers.html University of Cagliari] Italy&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana has been active contributor to the OWASP organization since 2005 contributing to the following OWASP projects: &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana has been active contributor to the OWASP organization since 2005 contributing to the following OWASP projects: &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] as main author the&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[https://www.owasp.org/index.php/Application_Security_Guide_For_CISOs application security guide for CISOs] as main author the&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[http://www.owasp.org/index.php/Application_Threat_Modeling application threat modeling methodology] of the [http://www.lulu.com/items/volume_64/5678000/5678680/13/print/5678680.pdf OWASP secure coding guide] the [http://www.owasp.org/index.php/Testing_Guide_Introduction introduction to the security testing methodology] the [http://www.owasp.org/index.php/Testing_Guide OWASP security testing guide] the [http://www.owasp.org/index.php/Category:OWASP_Source_Code_Review_OWASP_Projects_Project OWASP Source Code Review Project] and [http://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project] and most recently the OWASP [https://www.owasp.org/index.php/Global_Initiatives/Cyber_Security_Pre-accelerator_Initiative cyber-security startup accelerator initiative]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[http://www.owasp.org/index.php/Application_Threat_Modeling application threat modeling methodology] of the [http://www.lulu.com/items/volume_64/5678000/5678680/13/print/5678680.pdf OWASP secure coding guide] the [http://www.owasp.org/index.php/Testing_Guide_Introduction introduction to the security testing methodology] the [http://www.owasp.org/index.php/Testing_Guide OWASP security testing guide] the [http://www.owasp.org/index.php/Category:OWASP_Source_Code_Review_OWASP_Projects_Project OWASP Source Code Review Project] and [http://www.owasp.org/index.php/Category:OWASP_Security_Analysis_of_Core_J2EE_Design_Patterns_Project OWASP Security Analysis of Core J2EE Design Patterns Project] and most recently the OWASP [https://www.owasp.org/index.php/Global_Initiatives/Cyber_Security_Pre-accelerator_Initiative cyber-security startup accelerator initiative]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As public speaker Dr. Morana has presented topics of software and application security at several [http://www.owasp.org/index.php/Cincinnati#2009_Presentations_.28Archived.29 local chapter meetings] and&amp;#160; [https://soundcloud.com/owasp-podcast/appsecusa2013-cisoguide AppSec USA conferences] and summits in [http://www.slideshare.net/marco_morana/rochester-security-summit-presentation USA] and AppSec [https://www.owasp.org/index.php/AppSecEU2011 Europe] and summits in [http://www.owasp.org/index.php?title=Italy_OWASP_Day_2&amp;amp;setlang=es Italy]. Besides presenting at OWASP conferences Mr. Morana gave talks at [http://www.slideshare.net/marco_morana/secure-code-reviews-presentation CSI] and [http://www.slideshare.net/marco_morana/software-security-business-case-presentation Blackhat] security conferences. &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot; &gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 18:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234069&amp;oldid=prev</id>
		<title>Marco-cincy at 18:29, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234069&amp;oldid=prev"/>
				<updated>2017-10-03T18:29:08Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:29, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; Intel]&amp;#160; &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234068&amp;oldid=prev</id>
		<title>Marco-cincy at 18:28, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234068&amp;oldid=prev"/>
				<updated>2017-10-03T18:28:41Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:28, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Inte&lt;/del&gt;]&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;l using this book as required text book. &lt;/del&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course [https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html CYB602 Threat Modelling &amp;amp; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Intel&lt;/ins&gt;] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/ins&gt;In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234067&amp;oldid=prev</id>
		<title>Marco-cincy at 18:27, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234067&amp;oldid=prev"/>
				<updated>2017-10-03T18:27:11Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:27, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Intel &lt;/del&gt;using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[https://www.nu.edu/OurPrograms/SchoolOfEngineeringAndTechnology/ComputerScienceAndInformationSystems/Courses/CYB602.html &lt;/ins&gt;CYB602 Threat Modelling &amp;amp; &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Inte]l &lt;/ins&gt;using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO version 2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234066&amp;oldid=prev</id>
		<title>Marco-cincy at 18:25, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234066&amp;oldid=prev"/>
				<updated>2017-10-03T18:25:59Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:25, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; Intel using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;as vs &lt;/del&gt;2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; Intel using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;version &lt;/ins&gt;2 with planned release in 2018.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234065&amp;oldid=prev</id>
		<title>Marco-cincy at 18:25, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234065&amp;oldid=prev"/>
				<updated>2017-10-03T18:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:25, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; Intel using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; Intel using this book as required text book. In 2016, Dr Morana was also engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments] &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Dr Morana current effort&amp;#160; or OWASP is to lead the effort for revising the Application Security Guide for CISO as vs 2 with planned release in 2018.&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234064&amp;oldid=prev</id>
		<title>Marco-cincy at 18:23, 3 October 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Marco_Morana&amp;diff=234064&amp;oldid=prev"/>
				<updated>2017-10-03T18:23:27Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 18:23, 3 October 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l12&quot; &gt;Line 12:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 12:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr Morana work on application and software security has been widely published on [http://issuu.com/insecure/docs/insecure-17 In-secure magazine],[http://www.darkreading.com/ Secure Enterprise], [http://www.issa.org/Members/Journals-Archive/2006.html ISSA Journal] and the [http://portal.acm.org/citation.cfm?id=349060 C/C++ Users journal] as well as [http://iac.dtic.mil/iatac/download/security.pdf DHS Software Security Assurance], [https://www.csoonline.com/article/2134064/privacy/attention--cisos--strategy-is-the-only-security.html CIO Magazine], [https://www.bankinfosecurity.com/authors/marco-morana-i-963 Bank Info Security] and gave interviews for [http://fst.net.au/features/interview-marco-morana FST Media] and [https://www.youtube.com/watch?v=Ovn9a5kmvkw MarketForce Business Media LLC]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Dr. Morana co-authored one of the [https://en.wikipedia.org/wiki/Threat_model threat modelling methodologies], Process For Attack Simulation and Threat Analysis (PASTA) that is covered in the [http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470500964.html Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis] Book published by Wiley in 2015. In 2016 Dr. Morana was &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;engaged by NSA accredited National University to help with the curriculum of the course CYB602 Threat Modelling &amp;amp; Intel using this book as required text book. In 2016, Dr Morana was also &lt;/ins&gt;engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In 2016 Dr. Morana was engaged by ENISA to co-author the white paper, [https://www.enisa.europa.eu/publications/mobile-payments-security Security of Digital Wallet and Mobile Payments]&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Marco-cincy</name></author>	</entry>

	</feed>