This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Working Groups Top 10 2009"
From OWASP
(3 intermediate revisions by the same user not shown) | |||
Line 22: | Line 22: | ||
|} | |} | ||
{| style="width:100%" border="0" align="center" | {| style="width:100%" border="0" align="center" | ||
− | ! colspan=" | + | ! colspan="7" align="center" style="background:#a0c0e0; color:white"|<font color="black">'''First Working Session''' |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"|'''Location''' | | style="width:15%; background:#7B8ABD" align="center"|'''Location''' | ||
Line 43: | Line 37: | ||
* Discuss current Top10 structure and objectives | * Discuss current Top10 structure and objectives | ||
* Define methodology to collect attacks statistics | * Define methodology to collect attacks statistics | ||
− | |||
− | |||
− | |||
* Propose the revised OWASP Top 10 for 2009 | * Propose the revised OWASP Top 10 for 2009 | ||
|- | |- | ||
Line 51: | Line 42: | ||
| colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD - Please add any needed relevant resources here. | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD - Please add any needed relevant resources here. | ||
|- | |- | ||
− | | style="width:15%; background:#7B8ABD" align="center"|'''Organizational Model''' | + | | style="width:15%; background:#7B8ABD" align="center"|'''Working Group Sessions General Methodology''' |
− | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black"> | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">Please see [[:Working Sessions Methodology|'''here''']]. |
+ | |- | ||
+ | | style="width:15%; background:#7B8ABD" align="center"|'''Chosen Organizational Model''' | ||
+ | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">"Invited Participants" | ||
+ | |- | ||
+ | | style="width:15%; background:#7B8ABD" align="center"|'''Working Session Secretary''' | ||
+ | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">TBD - [mailto:name@name Name] | ||
|- | |- | ||
| style="width:15%; background:#7B8ABD" align="center"|'''Working Session Registration''' | | style="width:15%; background:#7B8ABD" align="center"|'''Working Session Registration''' | ||
− | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">If the Organizational Model is "Everybody is a Participant", please add your name and e-mail here. Otherwise, please wait for | + | | colspan="6" style="width:85%; background:#cccccc" align="left"|<font color="black">If the Organizational Model is "Everybody is a Participant", please add your name and e-mail here. Otherwise, please wait for an invitation.<br> |
* [mailto:name@name Name] | * [mailto:name@name Name] | ||
|} | |} | ||
{| style="width:100%" border="0" align="center" | {| style="width:100%" border="0" align="center" | ||
− | + | | style="width:15%; background:#a0c0e0" align="center"| | |
− | |||
− | | style="width:15%; background:# | ||
| style="width:42%; background:#b3b3b3" align="center"|'''Proposed by Working Group''' | | style="width:42%; background:#b3b3b3" align="center"|'''Proposed by Working Group''' | ||
| style="width:43%; background:#b3b3b3" align="center"|'''Approved by OWASP Board''' | | style="width:43%; background:#b3b3b3" align="center"|'''Approved by OWASP Board''' | ||
|- | |- | ||
− | | style="width:15%; background:# | + | | style="width:15%; background:#a0c0e0" align="center"|'''First Working Session Outcomes'''<br>(Initiatives, Statements, and Decisions) |
| style="width:42%; background:#C2C2C2" align="center"|To fill in here. | | style="width:42%; background:#C2C2C2" align="center"|To fill in here. | ||
| style="width:43%; background:#C2C2C2" align="center"|To fill in here | | style="width:43%; background:#C2C2C2" align="center"|To fill in here | ||
|- | |- | ||
|} | |} |
Latest revision as of 14:06, 30 September 2008
Working Group | ||||||
---|---|---|---|---|---|---|
Name | OWASP Top 10 2009 | |||||
Mission | To provide a key awareness document for web application security. | |||||
Lead | Dave Wichers | |||||
Team | Jeff Williams | |||||
Mailing List | Subscription Page | |||||
Related Projects (if any) | OWASP Top Ten Project |
First Working Session | ||||||
---|---|---|---|---|---|---|
Location | OWASP EU Summit Portugal 2008 | |||||
Date | TBD | |||||
Agenda | TBD | |||||
Objectives |
| |||||
Working Session Resources | TBD - Please add any needed relevant resources here. | |||||
Working Group Sessions General Methodology | Please see here. | |||||
Chosen Organizational Model | "Invited Participants" | |||||
Working Session Secretary | TBD - Name | |||||
Working Session Registration | If the Organizational Model is "Everybody is a Participant", please add your name and e-mail here. Otherwise, please wait for an invitation. |
Proposed by Working Group | Approved by OWASP Board | |
First Working Session Outcomes (Initiatives, Statements, and Decisions) |
To fill in here. | To fill in here |