Difference between revisions of "Denver August 2010 meeting"

From OWASP
Jump to: navigation, search
m (aug 2010 mtg)
 
m (added rsvp link)
 
(2 intermediate revisions by one user not shown)
Line 1: Line 1:
== Wednesday 18 August 2010, 6pm @ [http://maps.google.com/maps?f=q&source=s_q&hl=en&q=hosting.com&sll=39.699262,-104.986725&sspn=0.159814,0.258522&ie=UTF8&radius=8.24&split=1&rq=1&ev=zi&hq=hosting.com&hnear=&ll=39.699262,-104.986725&spn=0.159814,0.258522&z=12&iwloc=A Hosting.com] ==
+
== Wednesday 18 August 2010, 6pm @ [http://maps.google.com/maps?f=q&source=s_q&hl=en&q=hosting.com&sll=39.699262,-104.986725&sspn=0.159814,0.258522&ie=UTF8&radius=8.24&split=1&rq=1&ev=zi&hq=hosting.com&hnear=&ll=39.699262,-104.986725&spn=0.159814,0.258522&z=12&iwloc=A Hosting.com] [http://denverowasp.eventbrite.com/ RSVP Now!] ==
  
 
=== Clint Pollock: "Protecting Your Applications from Backdoors" ===
 
=== Clint Pollock: "Protecting Your Applications from Backdoors" ===
How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data
+
''How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data''
 +
 
  
 
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.
 
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.
Line 16: Line 17:
  
 
Presenter: '''Clint Pollock'''
 
Presenter: '''Clint Pollock'''
Clint Pollock is a Senior Solutions Architect at [http://www.veracode.com/ Veracode]. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.
 
  
 +
Clint Pollock is a Senior Solutions Architect at [http://www.veracode.com/ Veracode]. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.
  
 
=== Agenda ===
 
=== Agenda ===

Latest revision as of 18:33, 5 August 2010

Wednesday 18 August 2010, 6pm @ Hosting.com RSVP Now!

Clint Pollock: "Protecting Your Applications from Backdoors"

How to Secure Your Business Critical Applications from Time Bombs, Backdoors & Data


With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.

Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.

In this session we will cover;

  • Prevalence of backdoors and malicious code in third party attacks
  • Definitions and classifications of backdoors and their impact on your applications
  • Methods to identify, track and remediate these vulnerabilities


Presenter: Clint Pollock

Clint Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity. In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk. Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches. Clint resides in Chicago, IL.

Agenda

  • 6pm: Pizza & pop, courtesy of Hosting.com
  • 6:30pm: Introduction and Chapter business
  • 6:45pm --> 8pm: Presentation


Back to OWASP Denver