Long Island

Become a Member NOW

Educational Supporter:

=News and Chapter Meetings=

A Message From The Chapter
Important update: September 24th, Chapter Meeting Session Recording: http://www.youtube.com/watch?v=r12yiXnagbY&sns=em

The September 25 meeting has been moved to September 24 Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th. Please modify your registration accordingly or register using the link below....

OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.

Next Meetings
In order to accommodate a larger group for the Monday September 24th meeting, the room has changed. Please see the meeting details below.

For those who cannot make the trip or unable to get a registration slot, Adelphi University will be graciously providing a live feed. You can connect to the feed one hour prior to the meeting. Please sign in as guest, there will be an option provided on the login form prior to the meeting.  The URL for this live feed can be found here. 

  9/24/2012 
 * Time: 6:30pm - 9:00 pm
 * Location: Room 108 on the first level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions: Map  |  Campus Map.


 * Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming

Abstract: Top Ten Web Defenses We cannot hack or firewall our way secure. Application programmers need to learn to code in a secure fashion if we have any chance of providing organizations with proper defenses in the current threatscape. This talk will discuss the 10 most important security-centric computer programming techniques necessary to build low-risk web-based applications.

Speaker Bio: Jim Manico is the VP of Security Architecture for WhiteHat Security, a web security firm. Jim is a participant and project manager of the OWASP Developer Cheatsheet series. He is also the producer and host of the OWASP Podcast Series.

RSVP Requested http://www.owasp.org/images/7/7f/Register.gif Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP. Apologies for the Inconvenience.


 * Registration Details: The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders.

 12/13/2012  
 * Details TBD

Call For Topics & Speakers If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a LI board member.

If you join our mailing list, then you will receive details of the meeting as soon as they are finalized. To be a co-sponsor for this or a future meeting consider annual chapter sponsorship If you can host an upcoming meeting please contact a LI board member.

=Calendar=

2012 Meeting Schedule The information on this page is subject to change, please check back frequently for updates

  December 13, 2012  
 * Details TBD

=Past Meetings=

May Meeting
 Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks 


 * Date: Thursday, May 10, 2012
 * Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions: Map  |  Campus Map Enter the building from the North and go down the stairs.


 * Time: 7:00pm-9:30pm
 * Free pizza and beverage will be provided.


 * Registration Details: The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders.


 * Meeting Agenda:

Practical Android Security

Abstract:

Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications. The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications. Topics:
 * Mobile Application Security
 * OWASP GoatDroid
 * OWASP MobiSec

One of Jack's presentations on mobile security

About the Speaker -

Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.

February Meeting
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities. Please find the details below'''


 * Date: Thursday, February 16, 2012
 * Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University.
 * Time: 7:00pm-9:30pm

RSVP Requested http://www.owasp.org/images/7/7f/Register.gif


 * Registration Details: This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly.


 * Meeting Agenda:

Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5. Topics:
 * Overview of BackTrack
 * Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)
 * Overview of the lab challenge (covers multiple owasp top 10 vulns)

Laptops are needed if you wish to participate in the lab exercise!

About the Speaker -

Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.

November

 * Date: Thursday, November 17, 2012
 * Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University.
 * Time: 7:00pm-9:30pm


 * Registration Details: This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly.


 * Meeting Agenda:

Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5. Topics:
 * Overview of BackTrack
 * Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)
 * Overview of the lab challenge (covers multiple owasp top 10 vulns)

Laptops are needed if you wish to participate in the lab exercise!

About the Speaker -

Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.

September
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' Helen will discuss one of the most widespread Web application Vulnerabilities. How can an application be attacked and how to protect yourself.
 * Date: Thursday, September 22, 2011
 * Time: 6:30pm - 9:30pm
 * Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000
 * Topics & Speakers:

About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company. Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.

Round Table Discussions Coordinated by Ryan Behan: Topics - Recent Attack on Infraguard Website. Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? LulzSec, Anonymous, A-Team - Motivations for attacks? How do small-medium size businesses protect themselves from this? Insurance, increased IT budgets? About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc. He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.

May Robert Gezelter - Minimum Necessary Implementation: Reducing Attack Surface increase Security Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS. Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers. We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors. He has spoken widely at conferences throughout the United States and internationally. He has also published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect
 * Date: Saturday, May 14, 2011
 * Time: 12:30pm - 3:30pm
 * Location: Student Center, Hosftra University, Hempstead, NY 11549-1000
 * Topics & Speakers:

March Date: 3/27/2011 Sunday Time: 12pm-3pm Place: 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753  Rajendra Umadas, OWASP Member

Intro to the OWASP Mobile Project

The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.

Dan Guido, OWASP NY/NJ Board Member

The Exploit Intelligence Project

In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year.

In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats.

Ryan Behan, OWASP LI Board Member

WebScarab Demo / Web Vulnerabilities Intro WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.

In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.

''Free pizza and beverage will be provided. After event networking will be held at a local bar.''

=Chapter Board Members and Contacts=


 * [mailto:heleng@owasp.org Helen Gao, CISSP]
 * [mailto:ryan.behan@owasp.org Ryan C Behan]