Difference between revisions of "BeNeLux OWASP Day 2013"

From OWASP
Jump to: navigation, search
Line 89: Line 89:
  
  
<!-- Fourth tab -->
+
<!-- Fourth tab - currently removed
  
 
= Trainingday =
 
= Trainingday =
Line 134: Line 134:
 
<br>
 
<br>
  
 +
-->
  
  
Line 186: Line 187:
 
<br>
 
<br>
 
<br>
 
<br>
 +
 +
<!--
  
 
<div id="AsiaSlowinska"></div>
 
<div id="AsiaSlowinska"></div>
Line 200: Line 203:
 
<br>
 
<br>
  
<div id="RuedigerBachmann"></div>
+
-->
=== Code review for Large Companies, by Ruediger Bachmann (SAP) ===
+
''Abstract:''<br>
+
Static source code analysis should be an essential part in the secure software development life cycle (SDLC) to start to minimize the number of potential vulnerabilities already in a very early stage in the software development process.<br>
+
The introduction of static code analysis at a large software manufacturer is a big challenge. In addition to the technical difficulties – based on the sheer number and size of the software projects or the number of different programing languages – there are also non-technical issues like creating new security awareness, trainings to use the provided tools efficiently and integration of analysis processes into the software development and maintenance life cycle.<br>
+
This talk gives an overview of the company-wide introduction of static code analysis at SAP AG.
+
<br>
+
''Bio:''<br>
+
After graduating with a degree in mathematics and computer science at the University of Giessen in 1997, Ruediger Bachmann worked at various software companies and IT service providers mainly in software development. Currently he is employed at SAP AG in Germany as a Development Architect in the central code analysis team. There he is focusing on application security and security code scans.<br>
+
 
+
<div id="LievenDesmet"></div>
+
 
+
=== Sandboxing JavaScript, by Lieven Desmet (Research Manager at KU Leuven) ===
+
''Abstract:''<br>
+
The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10 000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website.<br>
+
In this talk, we propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox.<br>
+
We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.<br>
+
<br>
+
''Bio:''<br>
+
Lieven Desmet is Research Manager on Software Secure at the iMinds-DistriNet Research Group (KU Leuven, Belgium), where he coaches junior researchers in web application security and participates in dissemination and valorization activities. His interests are in security of middleware and web-enabled technologies. Lieven is actively engaged in OWASP and is board member of the OWASP Chapter Belgium.<br>
+
<br>
+
<br>
+
 
+
<div id="ErwinGeirnaert"></div>
+
=== OWASP Top 10 vs Drupal, by Erwin Geirnaert (Zion Security) ===
+
''Abstract:''<br>
+
Drupal is the most used and well-known open source content management system in the world. Created by Dries Buytaert years ago it has grown with the support of a big community. Drupal 7 is already released and there is an entire ecosystem for Drupal and Drupal web agencies.<br>
+
During this presentation we will discuss the findings of an automated static code analysis of Drupal 6 and Drupal 7 and how Drupal protects against the OWASP Top 10 Application Security Risks. We will explain the security weaknesses that remain when you use Drupal and what you can implement to have a secure cloud server running Drupal.<br>
+
<br>
+
''Bio:''<br>
+
Erwin founded ZION SECURITY in 2005 to help companies to protect against the latest threats, attacks against web applications. ZION SECURITY is nowadays a Belgian market leader in the field of security testing, vulnerability management, penetration testing and banking security. Erwin has more than 10 years of experience in web security, graduating with a Master of Science in Software Development from the University of Ghent. Erwin executes different types of projects for a lot of international software companies, financial institutions, telecom and web agencies. Specialist in executing code reviews in different development languages for critical applications, executing continuous penetration tests of their infrastructure and Internet applications. A specialist in J2EE, PHP, .NET, mobile app and web services security. Erwin architects secure e-business projects for web agencies and software companies. He is a recognized application security expert and speaker at international events like Javapolis, OWASP, Eurostar, LSEC,...<br>
+
<br>
+
 
+
<div id="MarcHullegieAndKeesMastwijk"></div>
+
=== Forensics, by Marc Hullegie and Kees Mastwijk (Vest Information Security) ===
+
''Abstract:''<br>
+
In today’s investigations, forensics has become an important investigative method in fighting and solving (cyber)crimes and irregularities. During the session you will be briefly taken through the landscape of Forensics Basics; the Fraud Triangle and scenario's; What to look for and the appliance of Digital Forensics. What are the Challenges, the required Skills and Expertise and Solutions to these challenges. Specific focus on the Forensics of Web Applications and what you can do the create a more forensic ready system.<br>
+
<br>
+
''Bio:''<br>
+
Marc Hullegie is founder and CEO of Vest Information Security and is widely experienced in the information security business in all types of areas: Security Architecture and Infrastructure, Security Audits and Testing, Security Management, Awareness and Digital Forensics. He presents lectures at (international) conferences and is looking forward to share experiences at the OWASP Benelux days 2013 with you.<br>
+
<br>
+
''Bio:''<br>
+
Kees Mastwijk is a security consultant working with Vest, acting as Security Auditor, Awareness Program leader and security Manager. He has a long (and ongoing) experience history in Digital Forensic Research.<br>
+
<br>
+
 
+
<div id="JohnWilander"></div>
+
===  Secure Web Integration Patterns in the Era of HTML5, by John Wilander (Svenska Handelbanken) ===
+
''Abstract:''<br>
+
Quite a few organizations are finding themselves in a legacy situation with their web applications. Over ten years have passed since the era of dynamic HTML and with the rise of HTML5 and mobile platforms there is now need to gradually move these legacy beasts into a new architecture. Additionally, more and more third party services are offered such as maps, tracking, social media tie-ins, video etc. What are the possible and suitable design patterns for bringing new web, old web, and third party web together? Can we isolate them from each other to secure the new apps from legacy and third party security vulnerabilities? We will dig into the postMessage api, the iframe sandbox directive, CORS, and the same-origin policy while comparing it to the previous generation of integration with jsonp and other hacks.
+
<br>
+
''Bio:''<br>
+
John Wilander is a frontend software developer at Svenska Handelbanken, the second strongest bank in the world according to Bloomberg Markets. He has been researching and working in application security for ten years and is an active leader in OWASP, the Open Web Application Security Project. In 2011 he organized the OWASP Summit Browser Security sessions in Portugal, with participants from the security teams behind Chrome, Firefox, Internet Explorer, Flash, and PayPal. During his years in academia he was elected best computer science teacher twice and nowadays gives 5-10 professional talks per year.<br>
+
<br>
+
<br>
+
 
+
<div id="DanCornell"></div>
+
 
+
=== Streamlining Application Vulnerability Management: Communication Between Development and Security Teams, by Dan Cornell (Denim Group) ===
+
''Abstract:''<br>
+
Identifying application-level vulnerabilities via scanning, penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams. The process also means that security managers need to get time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation will illustrate the communication difficulties between security and development teams, and how this usually results in unactionable reports and fewer vulnerabilities remediated. In addition, the presentation will walk through an example workflow of addressing application vulnerabilities as software defects. This will be based on freely-available tools and show specific examples of how vulnerabilities can be grouped together, false positives can be culled out, and vulnerabilities transitioned to software defects, as well as how security managers can monitor and verify progress.<br>
+
<br>
+
''Bio:''<br>
+
''Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. He leads Denim Group’s security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.<br>
+
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as RSA, OWASP AppSec USA, and OWASP EU Research in Greece.''<br>
+
<br>
+
<br>
+
 
+
<div id="DinisCruz"></div>
+
=== Making Security Invisible by Becoming the Developer’s Best Friends, by Dinis Cruz (Security Innovation) ===
+
''Abstract:''<br>
+
''Coming soon!''<br>
+
<br>
+
''Bio:''<br>
+
Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.<br>
+
For the past years Dinis has focused on the field of Static Source Code analysis, from May 2007 to Dec 2009 he worked as a independent consultant for Ounce Labs (bought by IBM in July 2009) where during active security engagements using Ounce's technology he developed the Open Source codebase which now is the foundation of the OWASP O2 Platform.<br>
+
Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between the multiple WebAppSec tools, the Security consultants and the final developers. Dinis is a also active trainer on .Net security having written and delivered courses for IOActive, Foundstone, Intense School and KPMG (at multiple locations including BlackHat), and has delivered a number of presentations and keynote speeches at multiple OWASP and Security related conferences.<br>
+
At OWASP, Dinis is the leader of the OWASP O2 Platform project<br>
+
<br>
+
<br>
+
 
+
=== Panel discussion about the legal aspects of penetration testing ===
+
''with Steven Wierckx, Luc Beirens, Jos Dumortier, Dieter Sarrazyn, ...''<br><br>
+
''Abstract:''<br> In the past couple of years security has become a more visible topic in the media. As a result many companies are asking for security reviews in the form of a penetration test. A lot of entrepreneurs took the opportunity to form teams and/or companies that provide such services. There seems to be a lack of clear (standard) legal documentation to cover these activities both for the penetration tester and the company under review. With this panel discussion we would like to discuss this situation and to see if there is a possibility to have a standard document or framework that can be used as a starting point for companies and professionals to use as a contract. The purpose would be to end up with a (set of) documents similar to the “Testaankoop standard huurcontract”, this is a well-known Belgian contract framework for renting a house where both parties are protected and that is clear to both parties. It can be used without further legal intervention.<br>
+
<br>
+
<li>''Bio Steven Wierckx, ps_testware:''<br>
+
Steven Wierckx is currently working as Security Tester for [http://www.pstestware.com/ ps_testware], he specialises in web application security and keeps a security related blog [http://www.ihackforfun.eu/ ihackforfun]. He is also wrting articles and doing technical reviews for PenTest Magazine.<br>
+
<br>
+
<li>''Bio Luc Beirens, FCCU:''<br>
+
Head of Belgian Federal Computer Crime Unit & Chair EU Cybercrime Task Force trying to create partnerships and circumstances for a safer cyberspace.<br>
+
<br>
+
<li>''Bio Jos Dumortier, ICRI:''<br>
+
Jos Dumortier is Professor of ICT Law at the University of Leuven (Belgium) and the Director of the Interdisciplinary Research Centre for ICT and Law (ICRI) (www.icri.be). With his research team he participates in a series of R & D projects in the domain of telemedicine.<br>
+
He is also a member of the Bar of Brussels and partner in “time.lex”, a law firm specialized in information and technology law (www.timelex.eu).<br>
+
He participates in the boards of several national and international scientific and business associations and is a member of various editorial and program committees. <br>
+
He is the editor of the International Encyclopedia of Cyber Law and the author of more than one hundred books and articles on legal issues related to the information society.<br>
+
Jos Dumortier has taken the lead in a large number of European studies and projects in the area of information security, privacy and identity management. He worked on an assignment of the European Commission (DG INFSO) for a study on the legal obstacles for interoperable eHealth in Europe and on several studies for the Flemish government related to the implementation of a regional eHealth platform. He is also a member of the Flemish data protection supervisory authority for the health sector.<br>
+
<br>
+
<li>''Bio Dieter Sarrazyn, PWC:''<br>
+
Dieter is a senior manager and consultant within PwC and a team leader for Risk Management assessment services. His main focus is in performing penetration tests (external as well as internal), performing security audits, creating and evaluating security architectures,and creating and setting up vulnerability management frameworks & tools. He is a Certified Information Systems Security Professional (CISSP), a Certified Intrusion Analyst (GCIA), a Certified Incident Handling Analyst (GCIH), a Certified Intrusion Analyst (GCIA) a GIAC Systems and Network Auditor (GSNA). Dieter is also SANS Local Mentor and SANS Community Teacher<br>
+
<br>
+
<br>
+
  
 
<!-- Sixth tab -->
 
<!-- Sixth tab -->
Line 368: Line 271:
  
 
==== OWASP BeNeLux 2013 Sponsors: ====
 
==== OWASP BeNeLux 2013 Sponsors: ====
TBD
+
 
 +
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]
 +
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]
 +
 
 
<!--
 
<!--
 
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]
 
[http://www.madisongurkha.nl https://www.owasp.org/images/6/6e/Madison-gurkha-logo.jpg]
 
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]
 
[http://www.sogeti.nl https://www.owasp.org/images/9/94/Sogeti_logo.png]
[http://www.vest.nl https://www.owasp.org/images/1/1d/Logo_Vest_BIG_170.gif]
 
 
<br>
 
<br>
 
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]
 
[http://www.iminds.be https://www.owasp.org/images/thumb/a/a1/Iminds-logo.png/200px-Iminds-logo.png]
[http://www.zionsecurity.com https://www.owasp.org/images/e/e6/Zionsecurity.jpg]
 
 
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]
 
[http://on2it.net https://www.owasp.org/images/3/3d/On2it-sponsor.png]
 
--!>
 
--!>

Revision as of 00:25, 6 October 2013

Bnl13header-v.1.0.png



[edit]

Welcome to OWASP BeNeLux 2013

The OWASP BeNeLux Program Committee

  • Bart De Win / Sebastien Deleersnyder/ Lieven Desmet/ David Mathy, OWASP Belgium
  • Martin Knobloch / Ferdinand Vroom, OWASP Netherlands
  • Jocelyn Aubert / Andre Adelsbach/ Thierry Zoller, OWASP Luxembourg


Tweet!

Event tag is #owaspbnl13

funds to OWASP earmarked for BeNeLux OWASP Day 2013.


OWASP BeNeLux training day and conference are free!

Registration is not yet open:

Buttoncreate.png


To support the OWASP organisation, consider to become a member, it's only US$50!
Check out the Membership page to find out more.


Venue is






Parking & roadmap:

There is a public parking close to the conference venue.

Roadmap and parking:



Hotels nearby:



Conferenceday, November 29th

Location

TBD (for details, check the Venue tab)

Agenda

Time Speaker Topic
09h00 - 10h00 Registration
10h00 - 10h15 OWASP Benelux Organization Welcome
10h15 - 10h30 TBD OWASP update
10h30 - 11h10 TBD Title
Abstract:
11h10 - 11h50 TBD Title
Abstract:
11h50 - 12h30 TBD Title
Abstract:
12h30 - 13h30 Lunch
13h30 - 14h10 TBD Title
Abstract:
14h10 - 14h50 TBD Title
Abstract:
14h50 - 15h30 TBD Title
Abstract:
15h30 - 15h50 Break
15h50 - 16h30 TBD Title
Abstract:
16h30 - 17h10 TBD Title
Abstract:
17h10 - 17h50 TBD Panel Discussion about...
17h50 - 18h00 OWASP Benelux 2013 organization Closing Notes




Social Event, November 28th

TBD

Capture the Flag!

  • Do you like puzzles?
  • Do you like challenges?
  • Are you a hacker?

Whether you are an experienced hacker or new enthusiast you should come to OWASP BeNeLux 2013 and participate in the Capture the Flag event November 29th 2013.

The OWASP CTF is especially designed to support challengers of all skill levels. The CTF contains multiple challenges in various fields related to application security. As every challenge gains you one point, you can pick and choose which challenge you want to play.

All you need is a laptop with a wifi card and your favorite (preferably) non-commercial tools.

So come, show off your skills, learn new tricks and above all have a good time at the CTF event.



Hosted and co-organized by: