[websec] OWASP AppSec Research EU CFP/CFT

OWASP AppSec EU <appseceu@owasp.org> Wed, 28 March 2012 21:50 UTC

Return-Path: <appseceu@owasp.org>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 503FD21E8097 for <websec@ietfa.amsl.com>; Wed, 28 Mar 2012 14:50:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.676
X-Spam-Status: No, score=-1.676 tagged_above=-999 required=5 tests=[AWL=1.300, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id OLz4IBlGIEUU for <websec@ietfa.amsl.com>; Wed, 28 Mar 2012 14:50:41 -0700 (PDT)
Received: from mail-gy0-f172.google.com (mail-gy0-f172.google.com []) by ietfa.amsl.com (Postfix) with ESMTP id 501F821E801E for <websec@ietf.org>; Wed, 28 Mar 2012 14:50:41 -0700 (PDT)
Received: by ghbg16 with SMTP id g16so1244977ghb.31 for <websec@ietf.org>; Wed, 28 Mar 2012 14:50:41 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:date:message-id:subject:from:to:x-gm-message-state :content-type; bh=CdW+SekopqA9mBMDq8ciBZdoE8iejZr2i6DcDqgdX3s=; b=OVaepX4gTfttdQgtgyssew4CkYVmf953821vyUAXluEms7f7reXhzcj0Lu5H6CUQl0 wPeT56iVUDSkHpBpNR+tr9jMfnV3J20CmeGUA3BfWIx25ygg5Fc1ofd2qYSw7RVOZSok 0czax5uR3GGSs/CjPtkjk+mPJxLpoTNvmnLZC2Ndi1xLEyxZi5gT/S2OCiHBZh1W/zIK A4SqNQ6HbK0ZPMr9jCzPrC48IRs14/tfxAWJGSLLNgYazrT8BbxoFuBBY9tqLF/Vnhj1 w4rplreAdHr6IRW0vb74XSrW8Pq0f4ImBJHKjEPI8fdnsBhW9/zmnq0Nm6eYELCLZ85g YDbw==
MIME-Version: 1.0
Received: by with SMTP id i5mr614967igq.14.1332971440683; Wed, 28 Mar 2012 14:50:40 -0700 (PDT)
Received: by with HTTP; Wed, 28 Mar 2012 14:50:40 -0700 (PDT)
Date: Wed, 28 Mar 2012 22:50:40 +0100
Message-ID: <CAL8-oJw_gWiYi4t+6=OV3n8FXPYK9cgLoRpTXsegGX7GpxSVPA@mail.gmail.com>
From: OWASP AppSec EU <appseceu@owasp.org>
To: websec@ietf.org
X-Gm-Message-State: ALoCoQk3JY6In2cO64gXHetTg1KR9OblfopuykxdFT6DV1Za65+hIHhH7CdzSQf68LCASFQQuk2u
Content-Type: multipart/alternative; boundary=14dae934090d37bcd204bc549901
Subject: [websec] OWASP AppSec Research EU CFP/CFT
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2012 21:52:03 -0000


In 2012, OWASP is holding its Global AppSec Research (EU) Conference
in Athens, Greece! The OWASP AppSec Research conference is a premier
gathering for Information Security leaders and researchers. It brings
together the application security community to share cutting-edge
ideas, initiatives and technology advancements.

The OWASP AppSec Research 2012 Call for Papers (CFP) is open. Visit the
following URL to submit your proposal for the July 12-13, 2012 talks
in Athens, Greece:


The final closing date for submissions is Sunday, April 15, 2012. We
look forward to receiving submissions for technical presentations,
demos or research papers on the following topics:

* Security aspects of new/emerging web technologies/paradigms (mashups, web
2.0, offline support, etc)
* Security in web services, XML, REST, and service oriented architectures
* Security in cloud-based services
* Security of development frameworks (Struts, Spring, ASP.Net MVC etc)
* New security features in platforms or languages
* Next-generation browser security
* Security for the mobile web
* Secure application development (methods, processes etc) and secure coding
* Business risks of Application Security
* Starting and Managing Secure Development Lifecycle Programs.
* Privacy Concerns regarding applications and Data Storage
* Threat modeling of applications
* Vulnerability analysis and application security testing (code review,
pentest, static analysis etc)
* Countermeasures for application vulnerabilities
* Metrics for application security
* Application security awareness and education
* Securing e-government applications and services
* Government Initiatives & Case Studies
* OWASP Tools and Projects

OWASP AppSec Research 2012 is also currently soliciting training
providers for the conference. Visit the following URL to submit your
training proposal for the July 10-11, 2012 training days in Athens,


The following conditions apply for people or organizations that want
to provide training at the conference:

Training provider should provide class syllabus / training materials.
Proceeds will be split 60/40 (OWASP/Trainer) for the training class.
OWASP will provide the Venue, Marketing with Conference materials,
Registration and basic AV.

Trainers will cover travel and accommodations for the instructor(s)
and all course materials for students

OWASP will reserve up to 2 training slots at no cost and the trainer
may reserve up to one slot at no cost

Price per attendee: 2-Day Class €990 / 1-Day Class €495.

Trainers can brand training materials to increase their exposure
Classes are to be focused around Application Security but are in no
way limited to web application security.

We will look favourably on laboration-based/hands-on training.

We will make the first round of selections, based on the Training
proposals we have received by March 30, 2012. We have extended the
final closing date for submissions to Sunday, April 15, 2012.

Submit proposals to training@appsecresearch.org using the CFT template
All trainers will be required to submit a Training Instructor
Agreement (
in order to have their classed scheduled.

Additional information can be found at http://www.appsecresearch.org.

Please forward to all interested practitioners and colleagues.