<div dir="ltr">When a project is being used by the industry to describe a problem and it's used to explain an implementation of a solution, is an excellent signal that the project is valuable. I don't read anywhere the project endorses the vendor, on the contrary , the vendor uses the project to describe a problem being research by an OWASP project.<div><br></div><div>I believe this project is classified as 'incubator', but is showing clear signals of maturity to belong to at least LAB.</div><div><br></div><div>This is the kind of development I think the Owasp community wants to see when valuable projects are produced. </div><div><br></div><div>This seems very positive developments for OWASP Automated Threats to Web Applications' project. </div><div><br></div><div>Maybe contacting the vendor regarding the correct naming of the project for a next time is better ;-).</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Thu, Jun 23, 2016 at 9:06 AM, Colin Watson <span dir="ltr"><<a href="mailto:colin.watson@owasp.org" target="_blank">colin.watson@owasp.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Mario<div><br></div><div>Thank you very much for highlighting this.</div><div><br></div><div><div>OWASP does not endorse or recommend any products or services. The name/title of "OWASP Top 20" is incorrect since the threats are neither finite in number nor an ordered list. </div><div><br></div><div>   PDF:</div><div>   <a href="https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf" target="_blank">https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf</a></div><div><br></div><div>   Print:</div><div>   <a href="http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22295560.html" target="_blank">http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-22295560.html</a></div><div><br></div><div>The project name is simply "OWASP Automated Threats to Web Applications". The twenty automated threats so far documented in the "Automated Threat Handbook" could well grow in number, and the ordering is application/business specific, primarily due to the type and value of data, and therefore the relevant threat actors. The aim of the project was to create a listing of vendor-neutral and technology agnostic terms that describe real-world automated threats to web applications, at a level of abstraction that application owners can relate to. These terms are threat events to web applications undertaken using automated actions.</div><div><br></div><div>The actual vendor paper linked to is actually called "Mitigating OWASP Automated Threats" which is not the headline in the email marketing forwarded to this list.</div><div><br></div><div>Despite the mis-naming, I believe it is somewhat encouraging the automated threat terms defined by our project are being used in industry. It is one of the project's use cases (from the wiki):</div><div><h2 style="color:black;background-image:none;font-weight:normal;margin:1em 0px 0.25em;overflow:hidden;padding:0px;border-bottom-width:1px;border-bottom-style:solid;border-bottom-color:rgb(170,170,170);font-family:sans-serif;line-height:1.3"><span>Characterising vendor services</span></h2><p style="margin:0.5em 0px;line-height:inherit;color:rgb(54,43,54);font-family:sans-serif;font-size:14px">Better Best Ltd has developed an innovative technology to help gaming companies defend against a range of automated threats that can otherwise permit cheating and distortion of the game, leading to disruption for normal players. The solution can be deployed on premises, but is also available in the cloud as a service. But Better Best is finding difficulty explaining its solution in the market place, especially since it does not fit into any conventional product category. Better Best decide to use the terminology and threat events listed in the <b>OWASP Automated Threat Handbook</b> to define their product's capabilities. They hope this will provide some clarity about their offering, and also demonstrate how their product can be used to replace more than one other conventional security device. Additionally, Better Best writes a white paper describing how their product has been successfully used by one of their reference customers Hollybush Challenge Games to protect against <b>OAT-006 Expediting</b>, <b>OAT-005 Scalping</b>, <b>OAT-016 Skewing</b> and <b>OAT-013 Sniping</b>.</p></div><div><br></div><div><br></div><div>We encourage other vendors to use the names and codes. But please don't call it the "OWASP Top 20".</div><div><br></div><div>Regards<br></div><div><br></div><div>Colin Watson</div><div>OWASP Automated Threats to Web Applications project leader</div><div><br></div><div><a href="https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications" target="_blank">https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications</a></div></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div class="h5">On 23 June 2016 at 04:30, Mario Robles OWASP <span dir="ltr"><<a href="mailto:mario.robles@owasp.org" target="_blank">mario.robles@owasp.org</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="h5"><div style="word-wrap:break-word"><div><blockquote type="cite"><div style="text-align:start;text-indent:0px"><font color="#000000" style="font-family:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px">Interesting, actually what they are </font><font color="#000000">referring</font><font color="#000000" style="font-family:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px"> to is: </font><a href="https://www.owasp.org/images/3/33/Automated-threat-handbook.pdf" style="font-family:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-transform:none;white-space:normal;word-spacing:0px" target="_blank">https://www.owasp.org/images/3/33/Automated-threat-handbook.pdf</a></div></blockquote>Don’t take me wrong, I see this as a positive thing for OWASP<br><blockquote type="cite"><div style="font-family:Helvetica;font-size:12px;font-style:normal;font-weight:normal;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:11pt;font-family:Calibri,sans-serif;color:rgb(31,73,125)"><u></u> <u></u></span></div><div><div style="border-style:solid none none;border-top-color:rgb(181,196,223);border-top-width:1pt;padding:3pt 0in 0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><b><span style="font-size:10pt;font-family:Tahoma,sans-serif">From:</span></b><span style="font-size:10pt;font-family:Tahoma,sans-serif"><span> </span>Imperva <br><b>Sent:</b><span> </span>Wednesday, June 22, 2016 11:13 AM<br><b>To:</b><span> </span>Mario Robles<br><b>Subject:</b><span> </span>[IE] Protect web apps against the latest automated threats<u></u><u></u></span></div></div></div><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><u></u> <u></u></div><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:870px"><tbody><tr><td style="padding:0in"><div align="center"><table border="0" cellspacing="0" cellpadding="0" width="600" style="width:6.25in;border-collapse:collapse"><tbody><tr style="height:24pt"><td style="padding:0in 0in 0in 12pt;height:24pt"><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:8.5pt;font-family:Arial,sans-serif"><a href="http://mkto-ab130193.com/n/HW0030h0eJ9VnL40m5R00u3" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><u><span style="color:rgb(113,111,112)">New Paper: Mitigating OWASP Automated Threats</span></u></a><span> </span>|<span> </span><a href="http://go.imperva.com/index.php/email/emailWebview?mkt_tok=eyJpIjoiWmpRMk5tWTJNV1F3WkRWaCIsInQiOiJTTjBGUnFLMnhBOTQ3UXZZV3dvUitwdUdCOHAxZktwRm5FcXl5TmU1VzdhRDUvR3UxaldjbVRiaUtCQXdNV0lzaGh3czlhc2haZWE5bFgvLzl1cVZMZUZOZlhpend6VitsTWo1SmgyV0g1ST0ifQ%3D%3D" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><u><span style="color:rgb(113,111,112)">View in Web Browser</span></u></a><u></u><u></u></span></div></td></tr><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="100%" style="width:600px"><tbody><tr><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td valign="top" style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:580px"><tbody><tr style="height:18.75pt"><td valign="top" style="padding:0in;height:18.75pt"><div><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif;background-color:rgb(47,26,69)"> <u></u><u></u></div></div></td><td width="10" style="width:7.5pt;background-color:white;padding:0in;height:18.75pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif"><img border="0" width="10" height="25" alt="notch"><u></u><u></u></div></td><td width="139" style="width:104.25pt;background-color:white;padding:0in;height:18.75pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif;text-align:right"><img border="0" width="119" height="15" alt="Imperva"><u></u><u></u></div></td></tr></tbody></table></td><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td></tr><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="100%" style="width:600px"><tbody><tr><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td style="background-color:rgb(241,239,237);padding:0in;background-position:initial initial;background-repeat:initial initial"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:580px;border-collapse:collapse"><tbody><tr style="height:15pt"><td colspan="3" style="border-style:solid none none;border-top-color:rgb(225,224,223);border-top-width:1pt;background-color:rgb(236,236,236);padding:0.75pt;height:15pt;background-position:initial initial;background-repeat:initial initial"></td></tr><tr><td width="3%" style="width:16px;background-color:rgb(236,236,236);padding:0.75pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td width="94%" valign="top" style="width:543px;background-color:rgb(236,236,236);padding:0.75pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span><span style="font-size:13.5pt;font-family:Helvetica,sans-serif;color:rgb(47,26,69)">Prevent automated attacks on your web apps</span></span><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><br></span><span><span style="font-size:21pt;font-family:Helvetica,sans-serif;color:rgb(47,26,69)">How to Stop the New OWASP Top 20</span></span><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><u></u><u></u></span></div><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><u></u> <u></u></span></div><div style="margin-top:3.75pt;margin-bottom:18.75pt"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><a href="http://mkto-ab130193.com/n/HW0030h0eJ9VnL40m5R00u3" title="READ NOW" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="font-size:9pt;font-family:Arial,sans-serif;color:white;border:6pt solid rgb(229,118,34);padding:0in;background-color:rgb(229,118,34);background-position:initial initial;background-repeat:initial initial">    <strong><span style="font-family:Arial,sans-serif;font-weight:normal">READ NOW</span></strong>    </span></a></span><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><u></u><u></u></span></div></div></td><td width="3%" style="width:15px;background-color:rgb(236,236,236);padding:0.75pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td></tr><tr><td width="100%" style="width:600px;padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="100%" style="width:600px"><tbody><tr style="height:15pt"><td colspan="4" style="background-color:white;padding:0in;height:15pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr><tr><td width="2%" style="width:14px;padding:0in;min-width:10px"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td width="55%" valign="top" style="width:399px;padding:0in"><div><div style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif"><b><span style="font-family:Helvetica,sans-serif;color:rgb(47,26,69)">Put the OWASP Handbook into Action<u></u><u></u></span></b></div></div><div><div style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif"><b><span style="font-family:Helvetica,sans-serif;color:rgb(47,26,69)"><u></u> <u></u></span></b></div></div><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif">Cybercriminals increasingly use automation to attack web applications—from credential stuffing to account takeover, sniping to DDoS attacks, and more. Using the groundbreaking OWASP Automated Threat Handbook for Web Applications as a framework, this new white paper helps you go one step further to stop automated threats. You’ll learn:</span><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><u></u><u></u></span></div><div><ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif;color:rgb(113,111,112)"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif">Why automated threats are so pervasive today </span><span style="font-size:9pt;font-family:Helvetica,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif;color:rgb(113,111,112)"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif">Which automated threats target web applications </span><span style="font-size:10.5pt;font-family:Helvetica,sans-serif"><u></u><u></u></span></li><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif;color:rgb(113,111,112)"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif">How to effectively protect against the top 20 OWASP automated threats </span><span style="font-size:10.5pt;font-family:Helvetica,sans-serif"><u></u><u></u></span></li></ul><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif">Read this paper to see how real-world businesses put defenses in place to protect their business critical data and applications.</span><span style="font-size:10.5pt;font-family:Helvetica,sans-serif;color:rgb(113,111,112)"><u></u><u></u></span></div><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif;color:rgb(113,111,112)"><u></u> <u></u></span></div><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:10.5pt;font-family:Helvetica,sans-serif;color:rgb(113,111,112)"><u></u> <u></u></span></div></div><div style="margin-left:11.25pt;margin-top:3.75pt;margin-bottom:18.75pt"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-family:Helvetica,sans-serif;color:rgb(57,57,57)"><a href="http://mkto-ab130193.com/n/HW0030h0eJ9VnL40m5R00u3" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="font-size:9pt;font-family:Arial,sans-serif;color:white;border:6pt solid rgb(229,118,34);padding:0in;background-color:rgb(229,118,34);background-position:initial initial;background-repeat:initial initial">    READ NOW    </span></a><u></u><u></u></span></div></div></td><td width="3%" style="width:21px;padding:0in"></td><td width="20%" valign="top" style="width:164.671875px;border-style:none none none solid;border-left-color:rgb(225,224,223);border-left-width:1pt;padding:0in"><div align="center"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:164px"><tbody><tr><td width="90%" style="width:155px;padding:0in"><div align="center"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:155px"><tbody><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="100%" style="width:155px"><tbody><tr><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td style="padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif;text-align:center"><a href="http://mkto-ab130193.com/n/HW0030h0eJ9VnL40m5R00u3" title="Mitigate OWASP Top 20 Handbook" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><img border="0" width="127" height="160" alt="Mitigate OWASP Top 20 Handbook"></a><u></u><u></u></div></td><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td></tr><tr><td style="padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:9pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:9pt"> <u></u><u></u></span></div></td></tr></tbody></table></div></td><td width="5%" style="width:9px;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></div></td></tr><tr style="height:15pt"><td colspan="4" style="background-color:white;padding:0in;height:15pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:15pt;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td></tr><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:600px"><tbody><tr><td width="10" style="width:7.5pt;background-color:white;padding:0in;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:580px"><tbody><tr style="height:10.5pt"><td colspan="5" style="background-color:rgb(47,26,69);padding:0in;height:10.5pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr><tr><td style="background-color:rgb(47,26,69);padding:0in;background-position:initial initial;background-repeat:initial initial"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:580px"><tbody><tr><td width="20" style="width:15pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:540px"><tbody><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="73%" style="width:394px"><tbody><tr><td style="padding:0in"><div style="margin-bottom:6pt"><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:8.5pt;font-family:Helvetica,sans-serif;color:rgb(143,143,143)">Copyright ©2016 Imperva. All rights reserved.<br>3400 Bridge Parkway. Redwood Shores, CA 94065 USA<u></u><u></u></span></div></div></td></tr></tbody></table><p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"></p><table border="0" cellspacing="0" cellpadding="0" align="left" width="27%" style="width:145px"><tbody><tr><td style="padding:0in"><div style="margin-top:7.5pt"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif;text-align:right"><a href="http://mkto-ab130193.com/o03ve00an005JW04VLR3hm0" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="border:1pt none windowtext;padding:0in"><img border="0" width="21" height="19" alt="Facebook"></span></a><a href="http://mkto-ab130193.com/An0b04WR30e35Jh00m0w0VL" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="border:1pt none windowtext;padding:0in"><img border="0" width="21" height="19" alt="Twitter"></span></a><a href="http://mkto-ab130193.com/lnRhc000m5VJ0L3340e0x0W" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="border:1pt none windowtext;padding:0in"><img border="0" width="21" height="19" alt="Feed"></span></a><a href="http://mkto-ab130193.com/m000ed3040h35mJVRny0WL0" style="color:rgb(0,204,255);text-decoration:none" target="_blank"><span style="border:1pt none windowtext;padding:0in"><img border="0" width="21" height="19" alt="LinkedIn"></span></a><u></u><u></u></div></div></td></tr></tbody></table></td></tr></tbody></table></td><td width="20" style="width:15pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td><td style="padding:0in"></td><td style="padding:0in"></td><td style="padding:0in"></td><td style="padding:0in"></td></tr><tr><td style="background-color:rgb(47,26,69);padding:0in;background-position:initial initial;background-repeat:initial initial"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:580px"><tbody><tr><td width="20" style="width:15pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" width="100%" style="width:540px"><tbody><tr><td style="padding:0in"><table border="0" cellspacing="0" cellpadding="0" align="left" width="100%" style="width:540px"><tbody><tr><td style="padding:0in"><div style="margin-bottom:6pt"><div style="margin:0in 0in 0.0001pt;line-height:14.4pt;font-size:12pt;font-family:'Times New Roman',serif"><span style="font-size:8.5pt;font-family:Helvetica,sans-serif;color:rgb(143,143,143)"><br><br>By using this site you consent to receive cookies.<span> </span><a href="http://mkto-ab130193.com/ienW0eR5Jzm003000Vh3L04" style="color:rgb(0,204,255);text-decoration:none" target="_blank">Cookie Policy</a><span> </span>| <a href="http://mkto-ab130193.com/v04V0enA03mLWJf5R03h000" style="color:rgb(0,204,255);text-decoration:none" target="_blank">Privacy and Legal</a><u></u><u></u></span></div></div></td></tr></tbody></table></td></tr></tbody></table></td><td width="20" style="width:15pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td><td style="padding:0in"></td><td style="padding:0in"></td><td style="padding:0in"></td><td style="padding:0in"></td></tr><tr style="height:8.25pt"><td colspan="5" style="background-color:rgb(47,26,69);padding:0in;height:8.25pt;background-position:initial initial;background-repeat:initial initial"><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td><td width="10" style="width:7.5pt;padding:0in"><div style="margin:0in 0in 0.0001pt;line-height:18.75pt;font-size:12pt;font-family:'Times New Roman',serif"> <u></u><u></u></div></td></tr></tbody></table></td></tr></tbody></table></div></td></tr></tbody></table><div style="margin:0in 0in 0.0001pt;line-height:normal;font-size:12pt;font-family:'Times New Roman',serif"><img border="0" width="1" height="1"><u></u><u></u></div></div><br></blockquote></div><br></div><br></div></div>_______________________________________________<br>
OWASP-Leaders mailing list<br>
<a href="mailto:OWASP-Leaders@lists.owasp.org" target="_blank">OWASP-Leaders@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-leaders" rel="noreferrer" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-leaders</a><br>
<br></blockquote></div><br></div>
<br>_______________________________________________<br>
OWASP-Leaders mailing list<br>
<a href="mailto:OWASP-Leaders@lists.owasp.org">OWASP-Leaders@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-leaders" rel="noreferrer" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-leaders</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div>Johanna Curiel </div>OWASP Volunteer</div></div>
</div>