Hartford

Hartford

Sponsors
We would like to thank Tek Systems, Oracle, CA, and Microsoft for their generous sponsorship and helping make application security visible...

If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.

Agenda: Tuesday, June 22nd 2010 Meeting is canceled. Will be rescheduled for August.

Call for Sponsors/Speakers
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.

OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.

Some topics of interest for upcoming meetings include (but are not limited to):
 * Agile Software Development and Security
 * Breaking CAPTCHA
 * Hacking Identity 2.0
 * Breaking Commercial Software for Fun and Profit
 * Tactics for breaking software licensing schemes
 * Threat modeling
 * Advanced Persistent Threats
 * Hacking Mainframes/RACF
 * PCI/DSS Compliance
 * Misuse/abuse cases for business analysts

Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. SUBMIT HERE

Past Events
Agenda: Tuesday, May 18th 2010 Joint Meeting with ISACA on the topic of auditing web applications

Dmitry Zhdanov presentation is located here Mark Wireman presentation is located here James Ritche presentation is located here Mark Coderre presentation is located here

Agenda: Thursday, December 3rd 2009 SOCIAL MEDIA, PRIVACY AND BREACHES Ian Glazer, Distinguished Industry Analyst Burton Group Powerpoint presentation is located here VANISH: MAKING DATA DISAPPEAR George Dobbs, Chief Architect Knights of Columbus Powerpoint presentation is located here Agenda: Tuesday, November 17th 2009 ATTACK YOUR DATABASE BEFORE OTHERS DO Todd Desantis, Lead Sales Engineer Sentrigo Agenda: Tuesday, October 13th 2009 THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING Michael Waidner, Distinguished IBM Engineer and Security CTO IBM Agenda: Monday, September 14th 2009 OWASP: WHERE WE ARE AND WHERE WE ARE GOING Tom Brennan, OWASP Board Member OWASP WEB APPLICATION SECURITY ASSURANCE Gregory Gotta, SVP Security CA Agenda: Wednesday, June 10th 2009 THE ANATOMY OF SECURITY DISASTERS Marcus Ranum, CSO of Tenable Security Powerpoint presentation is located here Agenda: Tuesday, April 30th 2009 RECRUITING ELITE IT TALENT Jordan Haberfield (Agile Elephant), SVP of System One DETECTING BACKDOORS IN WEB APPLICATIONS Chris Wysopal CTO, Veracode Agenda: Monday, April 13th 2009 AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM Scott Ambler, Agile Practice Leader, IBM Powerpoint presentation is located here Agenda: Tuesday, February 10th 2009 OPEN SOURCE IDENTITY SERVICES (The Higgins Project) Mary Ruddy, Meristic ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS Ramesh Nagappan, Security Architect at Sun Microsystems STATE OF WEB APPLICATION SECURITY Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP Agenda: Wednesday, November 11th 2008 LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM Richard Eisenberg, Architect at Voltage Security Agenda: Wednesday, September 24th 2008 TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM Paul Roberts, Industry Analyst, The 451 Group Powerpoint presentation is located here MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM Andrew Stone, Senior Manager, Accenture Powerpoint presentation is located here Agenda: Wednesday, June 11th 2008 CARDSPACE AND USER CENTRIC IDENTITY Chris Winn, Security Evangelist, Microsoft IDENTITY GOVERNANCE FRAMEWORK Prateek Mishra, Product Manager, Oracle Powerpoint Presentation is here Agenda: Wednesday, April 30th 2008 THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES Anton Chuvakin, Chief Logging Evangelist, LogLogic KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE Jack Danahy, CTO and Founder, Ounce Labs Agenda: Thursday, February 28th 2008 HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY Chenxi Wang, Principal Analyst, Forrester Research EXPLOITING ONLINE GAMES Gary McGraw, CTO, Cigital

Locations
All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.

Hartford