This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Working Groups Top 10 2009"
From OWASP
| Line 35: | Line 35: | ||
| style="width:15%; background:#7B8ABD" align="center"|'''Date''' | | style="width:15%; background:#7B8ABD" align="center"|'''Date''' | ||
| colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD | ||
| − | + | |- | |
| − | | style="width:15%; background:#7B8ABD" align="center"|''' | + | | style="width:15%; background:#7B8ABD" align="center"| '''Agenda''' |
| − | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black"> | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD |
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"| '''Objectives''' | | style="width:15%; background:#7B8ABD" align="center"| '''Objectives''' | ||
| Line 48: | Line 48: | ||
* Propose the revised OWASP Top 10 for 2009 | * Propose the revised OWASP Top 10 for 2009 | ||
|- | |- | ||
| − | | style="width:15%; background:#7B8ABD" align="center"| ''' | + | | style="width:15%; background:#7B8ABD" align="center"| '''Working Session Resources''' |
| − | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black"> | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD - Please add any needed relevant resources here. |
| − | |- | + | |- |
| − | + | | style="width:15%; background:#7B8ABD" align="center"|'''Organizational Model''' | |
| − | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD - Please select "Everybody is a Participant" or "Invited Participants" | |
| − | + | |- | |
| − | | | + | | style="width:15%; background:#7B8ABD" align="center"|'''Working Session Registration''' |
| − | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">If the Organizational Model is "Everybody is a Participant", please add your name and e-mail here. Otherwise, please wait for a invitation.<br> | |
| − | + | * [mailto:name@name Name] | |
| − | |||
| − | |||
| − | |- | ||
| − | | style="width: | ||
| − | |||
| − | |||
| − | |||
| − | | | ||
| − | |||
|} | |} | ||
Revision as of 12:35, 30 September 2008
| Working Group | ||||||
|---|---|---|---|---|---|---|
| Name | OWASP Top 10 2009 | |||||
| Mission | To provide a key awareness document for web application security. | |||||
| Lead | Dave Wichers | |||||
| Team | Jeff Williams | |||||
| Mailing List | Subscription Page | |||||
| Related Projects (if any) | OWASP Top Ten Project | |||||
| Working Group Sessions General Methodology | |||||
|---|---|---|---|---|---|
| Please see here. | |||||
| First Working Session | ||||||
|---|---|---|---|---|---|---|
| Location | OWASP EU Summit Portugal 2008 | |||||
| Date | TBD | |||||
| Agenda | TBD | |||||
| Objectives |
| |||||
| Projected Outcomes |
| |||||
| Working Session Resources | TBD - Please add any needed relevant resources here. | |||||
| Organizational Model | TBD - Please select "Everybody is a Participant" or "Invited Participants" | |||||
| Working Session Registration | If the Organizational Model is "Everybody is a Participant", please add your name and e-mail here. Otherwise, please wait for a invitation. | |||||