Projects Summit 2013/Working Sessions/0017

From OWASP
Jump to: navigation, search

Global Summit 2013 Home Page
Global Summit 2013 Tracks

Working Session.jpg AppSensor 2.0 Hackathon
Please see/use the 'discussion' page for more details about this Working Session
Working Sessions Operational Rules - Please see here the general frame of rules.
WORKING SESSION IDENTIFICATION
Short Work Session Description In this hackathon we will focus on building the code for AppSensor 2.0, which will involve moving to a services (both REST and SOAP) model for event detection and response.
Related Projects (if any)


Email Contacts & Roles Chair
John Melton

Operational Manager
Samantha Groves @
Mailing list
Google Groups: owasp-project-summit-2013
WORKING SESSION SPECIFICS
Objectives
  1. Build code for AppSensor 2.0.
  2. Move to a service model of both REST and SOAP for event detection and response.
  3. Make it possible to identify and and eliminate the threat of an attacker before they are able to successfully identify an exploitable flaw.

Venue/Date&Time/Model Venue/Room
AppSec USA 2013: Times Square, New York City
Date & Time
Monday, November 18, 1:00PM - 5:00PM


Discussion Model
participants and attendees

WORKING SESSION OPERATIONAL RESOURCES
Projector, whiteboards, markers, Internet connectivity, power

WORKING SESSION ADDITIONAL DETAILS

NEW-PROJECTS-BANNER2.jpg

Chair: John Melton

John Melton is the development lead for the OWASP AppSensor project. He is a senior application security researcher at White Hat Security. He does design, development and security analysis of secure J2EE web-based applications.

Operational Manager: Samantha Groves

Samantha Groves is the Project Manager at OWASP. Samantha has led many projects in her career, some of which include website development, brand development, sustainability and socio-behavioural research projects, competitor analysis, event organisation and management, volunteer engagement projects, staff recruitment and training, and marketing department organisation and strategy implementation projects for a variety of commercial and not-for-profit organisations.

WORKING SESSION OUTCOMES / DELIVERABLES
Proposed by Working Group 'Delivered by Working Group

Define detection points.

After the Meeting - fill in here.

Provide guidance on how to respond once a malicious attacker has been identified.

After the Meeting - fill in here.

After the Meeting - fill in here.

After the Meeting - fill in here.

After the Meeting - fill in here.

After the Meeting - fill in here.

After the Meeting - fill in here.

After the Meeting - fill in here.

Working Session Participants

(Add you name by clicking "edit" on the tab on the upper left side of this page)

WORKING SESSION PARTICIPANTS
Name Company Notes & reason for participating, issues to be discussed/addressed

{{{summit_session_attendee_company21}}}
{{{summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed21}}}