This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Working Sessions University Outreach"

From OWASP
Jump to: navigation, search
(Created page with '[http://www.owasp.org/index.php/Summit_2011 ''' Return to the Global Summit 2011 Home Page''']<br> [http://www.owasp.org/index.php/Summit_2011_Schedule ''' Return to the Global S…')
 
Line 13: Line 13:
 
|-
 
|-
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Work Session Name'''  
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Work Session Name'''  
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | <font color="black"><span style="font-weight: bold;">Browser Working Group</span></font>
+
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | <font color="black"><span style="font-weight: bold;">University Outreach</span></font>
 
|-
 
|-
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Short Work Session Description'''  
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Short Work Session Description'''  
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | One of the great challenges of application security is browser security. The browser is becoming our de facto runtime platform for applications and it comprises a whole ecosystem of plug-ins and web technologies. Therefore we will spend a full day working together with the leading browser vendors to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and end-users. Do not miss this chance to influence what's important in browser security in the coming years. <br>
+
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | This summit will be the place to bring OWASP Educational Supporters together! What security major and minor educations are out there? How can OWASP participate and influence their curricula? How can the relationship between Universities and OWASP be standardized? What does OWASP have to offer Universities and what can they, in turn, expect from each other?<br>
 
|-
 
|-
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Related Projects (if any)'''  
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Related Projects (if any)'''  
Line 33: Line 33:
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Objectives'''  
 
| align="center" style="width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | '''Objectives'''  
 
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | <font color="black"></font><font color="black"></font><font color="black">
 
| align="left" colspan="6" style="width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | <font color="black"></font><font color="black"></font><font color="black">
#Discuss gaps and patterns in gaps in security coverage across frameworks,
+
</font>  
#Discuss possible solutions for security areas.</font>  
 
  
 
|-
 
|-
Line 41: Line 40:
 
| align="center" style="width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" |  
 
| align="center" style="width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" |  
 
'''Date&amp;Time'''  
 
'''Date&amp;Time'''  
 
February 9, 2011 <br>Time 9:00AM
 
  
 
| align="center" style="width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | '''Discussion Model'''<br>"Participants + Attendees"
 
| align="center" style="width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" | '''Discussion Model'''<br>"Participants + Attendees"
Line 69: Line 66:
 
|-
 
|-
 
| align="left" style="width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" |  
 
| align="left" style="width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);" |  
*'''Related resources:''' [[OWASP Working Session - Browser Security Letters]]
+
*'''Related resources:'''
*'''Frameworks to invite:''' .NET, J2EE, Spring, Struts, ASP.NET MVC, RoR, PHP, etc.
+
*'''Frameworks to invite:'''  
**10 Oct: "Open Letter to Frameworks (version for open mailing lists)" sent to
 
***Ruby-on-Rails Core mailing list
 
***Springnet Developer mailing list
 
***Struts Dev mailing list
 
  
 
|}
 
|}
Line 87: Line 80:
 
|-
 
|-
 
| align="center" style="width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>
 
| align="center" style="width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>
| align="center" style="width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Actionable advice for each individual frameworks.
+
| align="center" style="width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |  
 
| align="center" style="width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | After the Board Meeting - fill in here.
 
| align="center" style="width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | After the Board Meeting - fill in here.
 
|-
 
|-
 
| align="center" style="width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>
 
| align="center" style="width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);" | <br>
| align="center" style="width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | Identify points-of-contact for frameworks.
+
| align="center" style="width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" |  
 
| align="center" style="width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | After the Board Meeting - fill in here.
 
| align="center" style="width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);" | After the Board Meeting - fill in here.
 
|}
 
|}

Revision as of 04:25, 3 December 2010

Return to the Global Summit 2011 Home Page
Return to the Global Summit 2011 Schedule


Working Sessions Operational Rules - Please see here the general frame of rules.
WORKING SESSION IDENTIFICATION
Work Session Name University Outreach
Short Work Session Description This summit will be the place to bring OWASP Educational Supporters together! What security major and minor educations are out there? How can OWASP participate and influence their curricula? How can the relationship between Universities and OWASP be standardized? What does OWASP have to offer Universities and what can they, in turn, expect from each other?
Related Projects (if any)
Email Contacts & Roles Chair
Secretary
Mailing list
Subscription Page
WORKING SESSION SPECIFICS
Objectives

Venue/Date&Time/Model Venue
OWASP Global Summit Portugal 2011

Date&Time

Discussion Model
"Participants + Attendees"

WORKING SESSION OPERATIONAL RESOURCES
Projector, whiteboards, markers, Internet connectivity, power

WORKING SESSION ADDITIONAL DETAILS
  • Related resources:
  • Frameworks to invite:
WORKING SESSION OUTCOMES
Statements, Initiatives or Decisions Proposed by Working Group Approved by OWASP Board

After the Board Meeting - fill in here.

After the Board Meeting - fill in here.

Working Session Participants

(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)


WORKING SESSION PARTICIPANTS

Name Company Notes & reason for participating, issues to be discussed/addressed




























































If needed add here more lines.