<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.EmailStyle17
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.EmailStyle18
        {mso-style-type:personal;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.EmailStyle19
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1009403390;
        mso-list-template-ids:-405371644;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1
        {mso-list-id:1563558686;
        mso-list-template-ids:-1791725406;}
@list l1:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level2
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level5
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level8
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
@list l1:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='color:#1F497D'>Group, I occasionally get these type of questions. What would the education committee suggest as a &#8220;path of knowledge?&#8221;<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><p class=MsoNormal><span style='color:#1F497D'>Kate Hartmann<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Operations Director<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>301-275-9403<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><a href="http://www.owasp.org/"><span style='color:blue'>www.owasp.org</span></a> <o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Skype: Kate.hartmann1<o:p></o:p></span></p></div><p class=MsoNormal><span style='color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> Mike Eberhardinger [mailto:MEberhardinger@carolina.rr.com] <br><b>Sent:</b> Monday, March 14, 2011 7:21 PM<br><b>To:</b> 'Kate Hartmann'<br><b>Subject:</b> RE: AppSec EU - Dublin CFT/CFP and Registration<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal><span style='color:#1F497D'>Hello Kate,<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>I am a newcomer consultant to the ideas being addressed by OWASP, and would like to ask you for a suggested training path to take in order to become qualified to work within this discipline.<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Thanks,<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Mike Eberhardinger<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>Charlotte, NC<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p>&nbsp;</o:p></span></p><div><div style='border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=MsoNormal><b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style='font-size:10.0pt;font-family:"Tahoma","sans-serif"'> owasp-all-bounces@lists.owasp.org [mailto:owasp-all-bounces@lists.owasp.org] <b>On Behalf Of </b>Kate Hartmann<br><b>Sent:</b> Monday, March 14, 2011 11:47 AM<br><b>To:</b> owasp-all@lists.owasp.org<br><b>Subject:</b> AppSec EU - Dublin CFT/CFP and Registration<o:p></o:p></span></p></div></div><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'>Registration is OPEN!!!&nbsp; Follow the link for information on Early Bird Pricing!<o:p></o:p></span></b></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><a href="http://www.owasp.org/index.php/AppSecEU2011#tab=Registration">http://www.owasp.org/index.php/AppSecEU2011#tab=Registration</a> <o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>_______________<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>OWASP is currently soliciting training &amp; presentation proposals for the OWASP AppSec Europe 2011 Conference which will take place at Trinity College Dublin in Ireland, on June 6th through June 10th 2010. There will be training courses on June 6th, 7th and 8th followed by plenary sessions on the 9th and 10th with each day having at least three tracks.<o:p></o:p></span></p><div style='border:none;border-bottom:solid #AAAAAA 1.0pt;padding:0in 0in 2.0pt 0in'><p class=MsoNormal style='margin-bottom:.1in;mso-line-height-alt:14.25pt'><span style='font-size:14.5pt;font-family:"Arial","sans-serif";color:black'>Call for Training<o:p></o:p></span></p></div><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>We are seeking training proposals on the following topics (in no particular order):<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Security in Web 2.0, Web Services/XML<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Advanced penetration testing<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Static analysis for security<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Threat modeling of applications<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Secure coding practices<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Security in J2EE/.NET patterns and frameworks<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Application security with ESAPI<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l1 level1 lfo2'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>OWASP tools in practice<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>We will look favorably on laboration-based/hands-on training.<o:p></o:p></span></p><div style='border:none;border-bottom:solid #AAAAAA 1.0pt;padding:0in 0in 2.0pt 0in'><p class=MsoNormal style='margin-bottom:.1in;mso-line-height-alt:14.25pt'><a name="12d61c2027d4d224_12d61bbb4a20a490_Call_f"></a><span style='font-size:14.5pt;font-family:"Arial","sans-serif";color:black'><br>Call for Presentations<o:p></o:p></span></p></div><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>We are seeking people and organizations that want to present on any of the following topics (in no particular order):<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Business Risks with Application Security.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Starting and Managing Secure Development Lifecycle Programs.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Web Services-, XML- and Application Security.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Metrics for Application Security.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Application Threat Modeling.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Hands-on Source Code Review.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Web Application Security Testing.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>OWASP Tools and Projects.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Secure Coding Practices (J2EE/.NET).<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Privacy Concerns with Applications and Data Storage<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Web Application Security countermeasures<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Technology specific presentations on security such as AJAX, XML, etc.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:auto;margin-bottom:1.2pt;margin-left:.25in;text-indent:-.25in;line-height:18.0pt;mso-list:l0 level1 lfo4'><![if !supportLists]><span style='font-size:10.0pt;font-family:Wingdings'><span style='mso-list:Ignore'><span style='font:7.0pt "Times New Roman"'>&nbsp; </span></span></span><![endif]><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Anything else relating to OWASP and Application Security.<o:p></o:p></span></p><div style='border:none;border-bottom:solid #AAAAAA 1.0pt;padding:0in 0in 2.0pt 0in'><p class=MsoNormal style='margin-bottom:.1in;mso-line-height-alt:14.25pt'><a name="12d61c2027d4d224_12d61bbb4a20a490_Submis"></a><span style='font-size:14.5pt;font-family:"Arial","sans-serif";color:black'><br>Submission Deadline and Instructions<o:p></o:p></span></p></div><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Submission&nbsp;<b>deadline is Sunday April 3 23:59</b>&nbsp;(GMT).<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>To submit your proposal please fill out the form here:&nbsp;<a href="http://www.easychair.org/conferences/submission_new.cgi?a=c0b760808bfd" target="_blank" title="http://www.easychair.org/conferences/submission_new.cgi?a=c0b760808bfd"><span style='color:#3366BB;text-decoration:none'>http://www.easychair.org/conferences/submission_new.cgi?a=c0b760808bfd</span></a><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Please specify in the form whether you are submitting a&nbsp;<b>Training</b>&nbsp;or a&nbsp;<b>Presentation</b>&nbsp;proposal. Eg. Title: &quot;Training - Introduction to Web Application Security&quot;<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><b><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Only for Training Proposals</span></b><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><br>To submit your training proposal please fill out the&nbsp;<a href="http://www.owasp.org/index.php/File:OWASP_AppSec_Europe_2011_Call_for_Training.docx" target="_blank" title="File:OWASP AppSec Europe 2011 Call for Training.docx"><span style='color:#002BB8;text-decoration:none'>File:OWASP AppSec Europe 2011 Call for Training.docx</span></a>&nbsp;and attach it while filling out the online form.<o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Upon acceptance you'll be requested to fill out the&nbsp;<i>Training Instructor Agreement</i>&nbsp;where you'll find details on revenue split etc. The agreement will be reworked but the previous one is here:&nbsp;<a href="http://www.owasp.org/index.php/File:Training_Instructor_Agreement.doc" target="_blank" title="File:Training Instructor Agreement.doc"><span style='color:#002BB8;text-decoration:none'>File:Training Instructor Agreement.doc</span></a>.&nbsp;<o:p></o:p></span></p><p class=MsoNormal style='line-height:14.25pt'><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p>&nbsp;</o:p></span></p><div style='border:none;border-bottom:solid #AAAAAA 1.0pt;padding:0in 0in 2.0pt 0in'><p class=MsoNormal style='margin-bottom:.1in;mso-line-height-alt:14.25pt'><span style='font-size:14.5pt;font-family:"Arial","sans-serif";color:black'>Further Information<o:p></o:p></span></p></div><p class=MsoNormal style='line-height:14.25pt'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif";color:black'>Mail: </span></b><span style='font-size:12.0pt;font-family:"Arial","sans-serif";color:black'><a href="mailto:ireland@owasp.org" target="_blank">ireland@owasp.org</a></span><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></p><p class=MsoNormal style='line-height:14.25pt'><b><span style='font-size:12.0pt;font-family:"Arial","sans-serif";color:black'>Website:&nbsp;</span></b><span style='font-size:12.0pt;font-family:"Arial","sans-serif"'><a href="http://www.owasp.org/index.php/AppSecEU2011" target="_blank">http://www.owasp.org/index.php/AppSecEU2011</a></span><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'>Linkedin:</span></b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'>&nbsp;<a href="http://events.linkedin.com/OWASP-AppSec-Europe-2011/pub/522459" target="_blank">http://events.linkedin.com/OWASP-AppSec-Europe-2011/pub/522459</a><o:p></o:p></span></p><p class=MsoNormal style='mso-margin-top-alt:4.8pt;margin-right:0in;margin-bottom:6.0pt;margin-left:0in;line-height:18.0pt'><b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'>Twitter:</span></b><span style='font-size:10.0pt;font-family:"Arial","sans-serif";color:black'>&nbsp;#appseceu11<o:p></o:p></span></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p><p class=MsoNormal>Kate Hartmann<o:p></o:p></p><p class=MsoNormal>Operations Director<o:p></o:p></p><p class=MsoNormal>301-275-9403<o:p></o:p></p><p class=MsoNormal><a href="http://www.owasp.org/">www.owasp.org</a> <o:p></o:p></p><p class=MsoNormal>Skype:&nbsp; Kate.hartmann1<o:p></o:p></p><p class=MsoNormal><o:p>&nbsp;</o:p></p></div></body></html>