Chicago

For more information on OWASP Chicago meetings, please visit http://www.meetup.com/OWASP-Chicago-Chapter/ for more information.

We have a very active 2016 summer planned! June & August Chapter meetings and a Hackathon in the works for July. Stay tuned and be sure to spread the word!

If you're interested in speaking, sponsoring or hosting an event, [mailto:info@owasp-chicago.org please contact us].

= General Information =

Anyone in our area interested in application security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.

Make sure you sign up for the mailing list to receive meeting announcements. Our mailing list is at: https://lists.owasp.org/mailman/listinfo/owasp-chicago

Follow (and/or DM us) on Twitter: @owaspchicago LinkedIn: https://www.linkedin.com/groups/4049846

Chat with us on SLACK. https://owasp.slack.com/

If you have any questions about the Chicago chapter, please send an email to [mailto:michael.allen@owasp.org Michael Allen] or [mailto:joe.blanchard@owasp.org Joe Blanchard]

Interesting in being a sponsor or presenting at an event? Contact us at info@owasp-chicago.org

= Presentation History =

Past Talks
Codeburner - SCA. Video (https://vimeo.com/163686756)

Harnessing the Security Champion Model. By Joe Blanchard - Video (https://vimeo.com/163686635)

Application Security Automation and Governance by Michael Allen

'Android Application Security: Common Pitfalls and How To Avoid Them by Drew Suarez

Introducing idb: Simplified Blackbox iOS App Pentesting by Daniel Mayer

Tips for Building a Successful Application Security Program by Clint Pollock

You Will Perish In Flames: Simple Rules For Safely Handling Crypto by Thomas Ptacek

A9: Discovering Vulnerable Components with OWASP Dependency-Check by Steve Springett

How to Get the Most Out of Your Security Consulting Experience by Erin Ptacek

Repsheet: A Behavior Based Approach to Web Application Security by Aaron Bedra

Forget About BYOD: Develop a Realistic Mobile Security Policy by Tom Bain

Android Internals: From Forensics to Vulnerabilities by Drew Suarez

An Application Pen Tester’s Intro to Android Internals by Tom Palarz

Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides here

Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides here

Extreme Client-Side Exploitation - Nate McFeters - Presentation slides here

Automated Thrash Testing - Andre Gironda - Presentation slides here

Defeating Information Leak Prevention - Eric Monti - Presentation slides here

Webapps In Name Only Thomas Ptacek, Matasano Security

Token-less strong authentication for web applications: A Security Review Cory Scott, ABN AMRO

Secure Password Storage John Steven, Cigital

Stripe CTF 2.0; A Walkthrough Jeff Jarmoc, Dell SecureWorks and Zack Fasel, Dubsec Labs

Chicago OWASP Chapter Leaders

 * [mailto:michael.allen@owasp.org Michael Allen] - Chapter Lead
 * [mailto:joe.blanchard@owasp.org Joe Blanchard] - Chapter Lead
 * Rob Halvert - Presenter Lead
 * Adam Lewis - Venue Lead
 * Christopher Ehinger - Sponsor Lead
 * Vaune Carr
 * John Downey
 * Matt Konda - Previous Chapter Lead