Difference between revisions of "Cleveland"

From OWASP
Jump to: navigation, search
(Upcoming Meetings)
(43 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Cleveland|extra=The chapter leader is [mailto:kstasiak@securestate.com Ken Stasiak]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cleveland|emailarchives=http://lists.owasp.org/pipermail/owasp-cleveland}}
 
{{Chapter Template|chaptername=Cleveland|extra=The chapter leader is [mailto:kstasiak@securestate.com Ken Stasiak]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cleveland|emailarchives=http://lists.owasp.org/pipermail/owasp-cleveland}}
  
==== Local News ====
 
Thank you to everyone who attended the March OWASP Meeting.
 
  
We look forward to the next Cleveland OWASP meeting and will update you shortly on the next speaker and date!
+
== Upcoming Meetings ==
  
Special thanks to presenter Kevin Johnson for sharing his knowledge - and humor - with us all!
+
'''
 +
Thank you to everyone who joined us for the Cleveland Chapter OWASP Meeting on April 29th at Hyland Software!'''
  
 +
 +
Video of April's Presentation, ''Threat Modeling - The First Step in Secure Application Development'', is available '''[http://marketing.securestate.com/owasp-cleveland---meeting-registration HERE]'''
 +
 +
 +
Information for our next meeting will be posted HERE as it comes available. 
 +
 +
 +
''''''Would you like to speak at an OWASP Cleveland Meeting?''''''
 +
If we haven't approached you, but you believe you have new research that the security community would enjoy hearing about, we invite you to submit your presentation topic for consideration.
 +
 +
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.
 +
 +
To speak at upcoming OWASP Cleveland meeting or suggest a speaker, please submit your ideas via email to Michael Wilt- [mailto:mwilt@securestate.com mwilt@securestate.com]
 +
 +
== '''Past Events:''' ==
 +
Matt Neely & Tom Eston - Monday, April 29th from 11:00am - 2:00pm
 +
 +
'''Presentation: "Threat Modeling - The First Step in Secure Application Development"'''
 +
 +
'''''Abstract:'''''
 +
Application security issues continue to be a growing concern for businesses large and small. In fact, many people would be surprised to find that some of the most popular mobile apps downloaded are vulnerable to issues found in the OWASP Mobile Top 10 list of common vulnerabilities.
 +
 +
To address these issues security needs to be integrated into the software development life cycle (SDLC) used by the developers.  When developing an application in a secure manner threat modeling is an important but often forgotten first step.
 +
 +
This talk will start out an overview of where to integrate security into the SDLC process.  The remainder of the talk will focus on the threat modeling portion of the SecSDLC.  During this stage the OWASP Mobile Threat Model will be introduced. To provide real world examples vulnerabilities found in many of the top 25 downloaded apps found in the Apple App Store and Google Play will be covered.
 +
 +
'''''Speaker Bios:'''''
 +
Matt Neely is the Director of Research, Innovation and Strategic Initiatives at SecureState, a security management consulting firm.  At SecureState Matt leads the Research and Innovation team which focuses on imagining, researching and developing methodologies and tools that will solve industry related issues. In addition to Matt’s technical background, his strong understanding of business processes and organizational structure allow him to meet the security needs of the business world.  Matt is a regular speaker at various business and security user groups and conferences including Black Hat, Defcon, THOTCON and ShmooCon. Matt recently published the book Radio Reconnaissance in Penetration Testing.
 +
 +
Tom Eston is the manager of the Profiling and Penetration Team at SecureState. Tom leads a team of highly skilled penetration testers that provide attack and penetration testing services for SecureState's clients. Tom focuses much of his research on new technologies such as social media and mobile applications. He is the founder of SocialMediaSecurity.com which is an open source community dedicated to exposing the insecurities of social media. Tom is a security blogger, SANS Mentor, co-host of the Social Media Security podcast, and is a frequent speaker at security user groups and worldwide conferences including Black Hat, DEFCON, DerbyCon, Notacon, SANS, OWASP AppSec, and ShmooCon.
 +
 +
 +
Joe Kuemerle - Tuesday, December 18th from Noon – 2 p.m.
 +
 +
'''Presentation: Reverse Engineering .NET and Java'''
 +
 +
'''''Abstract:'''''
 +
Learn the various techniques bad guys can use to extract information from your .NET or Java applications or at least how you can recover the source code that your predecessor deleted before he quit. Enjoy a demo filled session on how easy it is to extract information from virtually any .NET or Java application.
 +
 +
'''''Speaker Bio:'''''
 +
Kuemerle is a developer and speaker in the Cleveland, OH area specializing in .NET development, security, data base and application lifecycle topics. He is currently a Lead Developer at BookingBuilder Technologies and is active in the technical community as well as a speaker at local, regional and national events.
 +
 +
 +
Kevin Johnson - Tuesday, March 22nd Noon – 2pm
 +
 +
'''Presentation:'''“Ninja Developers: Application Security Testing and Your SDLC.”'''
 +
 +
'''''Abstract:'''''
 +
The security of enterprise software is one of the key risks organizations can start to control today.  As new applications are developed and legacy software is updated, incorporating a measure of security testing can be one of the most critical ways to positively impact an organizations security posture.  To properly validate the security of enterprise applications a 3rd party penetration test or assessment may be enlisted - but the cost of testing each application quickly makes this impractical. This situation presents a challenging problem.
 +
 +
Kevin Johnson will explain how your development staff can incorporate techniques distilled from years of experience into your organization's development and release methodology.  Whether you're using Agile, RUP or Google programming, these tips and tricks will enable your developers to produce higher quality, more secure code right from the start.  Kevin will reveal some of the secrets of the masters learned from experience and industry leadership over the past decade - and show you how you can insert security into your software development lifecycle with minimal disruption and maximum effectiveness.
 +
 +
'''''Speaker Bio:'''''
 +
Kevin Johnson is a security consultant and founder of Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. Kevin is a certified instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking.
  
 
==== Chapter Meetings ====
 
==== Chapter Meetings ====
Line 21: Line 74:
  
 
[[Category:OWASP Chapter]]
 
[[Category:OWASP Chapter]]
 +
[[Category:Ohio]]

Revision as of 10:49, 3 May 2013

OWASP Cleveland

Welcome to the Cleveland chapter homepage. The chapter leader is Ken Stasiak
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Upcoming Meetings

Thank you to everyone who joined us for the Cleveland Chapter OWASP Meeting on April 29th at Hyland Software!


Video of April's Presentation, Threat Modeling - The First Step in Secure Application Development, is available HERE


Information for our next meeting will be posted HERE as it comes available.


'Would you like to speak at an OWASP Cleveland Meeting?' If we haven't approached you, but you believe you have new research that the security community would enjoy hearing about, we invite you to submit your presentation topic for consideration.

This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.

To speak at upcoming OWASP Cleveland meeting or suggest a speaker, please submit your ideas via email to Michael Wilt- mwilt@securestate.com

Past Events:

Matt Neely & Tom Eston - Monday, April 29th from 11:00am - 2:00pm

Presentation: "Threat Modeling - The First Step in Secure Application Development"

Abstract: Application security issues continue to be a growing concern for businesses large and small. In fact, many people would be surprised to find that some of the most popular mobile apps downloaded are vulnerable to issues found in the OWASP Mobile Top 10 list of common vulnerabilities.

To address these issues security needs to be integrated into the software development life cycle (SDLC) used by the developers. When developing an application in a secure manner threat modeling is an important but often forgotten first step.

This talk will start out an overview of where to integrate security into the SDLC process. The remainder of the talk will focus on the threat modeling portion of the SecSDLC. During this stage the OWASP Mobile Threat Model will be introduced. To provide real world examples vulnerabilities found in many of the top 25 downloaded apps found in the Apple App Store and Google Play will be covered.

Speaker Bios: Matt Neely is the Director of Research, Innovation and Strategic Initiatives at SecureState, a security management consulting firm. At SecureState Matt leads the Research and Innovation team which focuses on imagining, researching and developing methodologies and tools that will solve industry related issues. In addition to Matt’s technical background, his strong understanding of business processes and organizational structure allow him to meet the security needs of the business world. Matt is a regular speaker at various business and security user groups and conferences including Black Hat, Defcon, THOTCON and ShmooCon. Matt recently published the book Radio Reconnaissance in Penetration Testing.

Tom Eston is the manager of the Profiling and Penetration Team at SecureState. Tom leads a team of highly skilled penetration testers that provide attack and penetration testing services for SecureState's clients. Tom focuses much of his research on new technologies such as social media and mobile applications. He is the founder of SocialMediaSecurity.com which is an open source community dedicated to exposing the insecurities of social media. Tom is a security blogger, SANS Mentor, co-host of the Social Media Security podcast, and is a frequent speaker at security user groups and worldwide conferences including Black Hat, DEFCON, DerbyCon, Notacon, SANS, OWASP AppSec, and ShmooCon.


Joe Kuemerle - Tuesday, December 18th from Noon – 2 p.m.

Presentation: Reverse Engineering .NET and Java

Abstract: Learn the various techniques bad guys can use to extract information from your .NET or Java applications or at least how you can recover the source code that your predecessor deleted before he quit. Enjoy a demo filled session on how easy it is to extract information from virtually any .NET or Java application.

Speaker Bio: Kuemerle is a developer and speaker in the Cleveland, OH area specializing in .NET development, security, data base and application lifecycle topics. He is currently a Lead Developer at BookingBuilder Technologies and is active in the technical community as well as a speaker at local, regional and national events.


Kevin Johnson - Tuesday, March 22nd Noon – 2pm

Presentation:“Ninja Developers: Application Security Testing and Your SDLC.”

Abstract: The security of enterprise software is one of the key risks organizations can start to control today. As new applications are developed and legacy software is updated, incorporating a measure of security testing can be one of the most critical ways to positively impact an organizations security posture. To properly validate the security of enterprise applications a 3rd party penetration test or assessment may be enlisted - but the cost of testing each application quickly makes this impractical. This situation presents a challenging problem.

Kevin Johnson will explain how your development staff can incorporate techniques distilled from years of experience into your organization's development and release methodology. Whether you're using Agile, RUP or Google programming, these tips and tricks will enable your developers to produce higher quality, more secure code right from the start. Kevin will reveal some of the secrets of the masters learned from experience and industry leadership over the past decade - and show you how you can insert security into your software development lifecycle with minimal disruption and maximum effectiveness.

Speaker Bio: Kevin Johnson is a security consultant and founder of Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. Kevin is a certified instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking.

Chapter Meetings

To join the chapter mailing list, please visit our mailing list homepage. The list is used to discuss the meetings and to arrange meeting locations. Please check the mailing list before coming to a meeting to confirm the location and time and to catch any last minute notes.

Our chapter is sponsored by SecureState.


Cleveland OWASP Chapter Leaders

The chapter leader is Ken Stasiak