This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Manila/CallForPapers

From OWASP
Revision as of 05:34, 10 January 2015 by Jaypeelita (talk | contribs)

Jump to: navigation, search

Owasp Manila Objectives

The OWASP Manila objective is to raise awareness about Web Application Security in Philippines, so that any individuals and organizations can make informed decisions about true application security risks.

Event Date

On Progress

Who needs to Attend?

Application Developers
Application Testers and Quality Assurance
Application Project Management and Staff
Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff
Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance
Security Managers and Staff
Executives, Managers, and Staff Responsible for IT Security Governance
IT Professionals Interesting in Improving IT Security
Anyone interested in learning about or promoting Web Application Security

Call For Papers

Fellow Dev's, Op's, Hackers, CISO's, Do you have an aspect of application security that you would like to share with the OWASP community?

We are seeking people and organisations that want to provide training courses on any of the following topics:

Secure development: frameworks, best practices, secure coding, methods, processes, SDLC
Vulnerability analysis: code review, pentest, static analysis
Hands-on Source Code Review
Threat modelling
Mobile security
Cloud security
Browser security
HTML5 security
OWASP tools or projects in practice
New technologies, paradigms, tools
Privacy in web apps, Web services (REST, XML) and data storage
Operations and software security
Management topics in Application Security: Business Risks, Outsourcing/Offshoring, Awareness Programs, Project Management, Managing SDLC

Submit Proposals To: OwaspManila

Submission Deadline: Not Final

Call For Sponsorship

Stay Tuned!