Difference between revisions of "Bay Area"

From OWASP
Jump to: navigation, search
(Next Event)
Line 69: Line 69:
 
==== Bay Area OWASP Chapter Leaders  ====
 
==== Bay Area OWASP Chapter Leaders  ====
  
*[mailto:brian@appsecconsulting.com Brian Bertacini]
 
 
*[http://garrettgee.com Garrett Gee]  
 
*[http://garrettgee.com Garrett Gee]  
 
*[mailto:mandeep@cenzic.com Mandeep Khera]  
 
*[mailto:mandeep@cenzic.com Mandeep Khera]  
Line 77: Line 76:
  
 
[[Category:California]]
 
[[Category:California]]
 +
[[Category:OWASP Chapter]]

Revision as of 09:32, 18 January 2012

OWASP Bay Area

Welcome to the Bay Area chapter homepage.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Chapter Meetings

Date and Location

Next Event

November 30, 2011

Stanford Campus, Alumni Center, Lane/Ladato rooms
Directions: http://www.stanfordalumni.org/aboutsaa/alumni_center/directions.html
Parking will be available on Galvez field right next to the center.
Agenda

5:30pm - Welcome

5:40pm - Jason Chan, Practical Cloud Security Slides

6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm Slides

6:50pm - David Fifield, Evading censorship with browser-based proxies Slides

7:25pm - Abraham Kang, DOM-based XSS and output encoding Slides

You must RSVP at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing.


Jason Chan - Practical Cloud Security Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps

Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server.

David Fifield - Evading censorship with browser-based proxies Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page.

Abraham Kang - DOM-based XSS and output encoding An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.

Previous Event

WHAT: OWASP Silicon Valley Chapter Meeting

WHEN: Thursday, August 25th, 2011 - From 6 PM to 8.30 PM

WHERE: Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041

(right next to Starbucks)

REGISTER EARLY AS SEATING IS LIMITED

Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting

Agenda:

  • 6:00 PM - 6:30 PM .............Check-in, registration, networking
  • 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera
  • 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla
  • 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler

SPONSORS: Special Thanks to our host and sponsor - Mozilla Foundation.


funds to OWASP earmarked for Bay Area.

Bay Area Past Events

Bay Area Past Events

Bay Area OWASP Chapter Leaders