Phoenix

Local News
New Phoenix chapter open!

This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We are currently planning on holding bi-monthly meetings with two speakers at each meeting.

Tenative Meeting Schedule:


 * January 11, 2007
 * March 8, 2007
 * May 10, 2007
 * July 12, 2007
 * September 13, 2007
 * November 8, 2007

What talks would you like to see?
Please Update


 * Certificates
 * Application Firewalls
 * PHP
 * Security ROI
 * Penetration Testing Methods
 * AJAX
 * Cryptography in Web Applications
 * Reversing ActiveX controls
 * Using Local Proxies
 * Browser Safety / Security
 * Comparison of Phoenix/Tools

Where
UAT - University of Advancing Technology

Auditorium

2625 West Baseline Road

Tempe, Arizona

85283-1056

Entrance back of building

When
6:30PM, Thursday, Jan 11th

Agenda
 6:30 to 6:45 News & Introductions

 6:45 to 7:45 (1 hour): Data@Risk – Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc.

In September 2006, Mitre released statistics revealing that Web application security issues had claimed the top three spots for the most prevalent vulnerabilities being discovered in open source and commercial software. As evidenced by the growing number of corporate scandals that have occurred due to confidential data being accessed via Web hacks, securing public and private Web applications and Web services is now a top priority for many in the application development lifecycle.

This session will define what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data.

7:45 to 8:00: Wrap up

 8:00: Social - Gameworks: 5000 Arizona Mills Circle, Tempe

I'm looking forward to seeing everyone there!

Previous Meetings
Web Application 0-Day – Jon Rose

Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. We’ll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.

Discovering Web Application Vulnerabilities with Google CodeSearch

Building Application Security into the SDLC - Adam Muntner

Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to "bake security in" rather than "ice it on."