Difference between revisions of "Hartford"

From OWASP
Jump to: navigation, search
(Jun 10th 2009)
m
(47 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}
 
{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}
  
<paypal>Hartford</paypal>
 
  
 
== Sponsors ==
 
== Sponsors ==
  
We would like to thank [http://www.fortifysoftware.com/ Fortify], [http://www.veracode.com/ Veracode], [http://www.oracle.com/ Oracle], [http://www.the451group.com/ The 451 Group], [http://www.thehartford.com/ The Hartford] and [http://www.ibm.com/ IBM] for their generous sponsorship and helping make application security visible...
+
We would like to thank [http://www.hp.com/ HP], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...
  
 
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
 
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
  
== April 30th 2009 ==
+
<br><br>
<paypal>Hartford</paypal><br>
+
Food and Beverages for this event are sponsored by: [http://www.veracode.com/ Veracode]<br>
+
  
 +
== Call for Sponsors/Speakers ==
  
OPENING REMARKS: 5:00 - 5:15 PM<br>
+
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.
James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br>
+
 
 +
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.
 +
 
 +
Some topics of interest for upcoming meetings include (but are not limited to):
 +
* Cloud Security with a focus on PAAS
 +
* Breaking CAPTCHA
 +
* Threat modeling
 +
* Mobile Security
 +
* Entitlements Management
 +
* Advanced Persistent Threats
 +
* Misuse/abuse cases for business analysts
 +
 
 +
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]
 +
 
 +
== Past Events ==
 +
 
 +
'''Agenda: Wednesday, October 24th 2012'''<br>
 +
International Institute of Business Analysts (IIBA) Joint Meeting<br>
 +
James McGovern - Introduction to Security for Business Analysts<br>
 +
This meeting will be held at Chubb in Simsbury</br>
 +
 
 +
'''Agenda: Wednesday, September 26th 2012'''<br>
 +
Joint Meeting with OWASP Student Chapter<br>
 +
Introduction to Network Security<br>
 +
Anthony DAmato</br>
 +
 
 +
'''Agenda: Wednesday, May 23rd 2012'''<br>
 +
Introduction to SOA Security<br>
 +
James McGovern<br>
 +
 
 +
'''Agenda: Tuesday, May 18th 2010'''<br>
 +
Joint Meeting with ISACA on the topic of auditing web applications<br>
 +
 
 +
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]<br>
 +
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]<br>
 +
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]<br>
 +
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]<br>
 +
 
 +
'''Agenda: Thursday, December 3rd 2009'''<br>
 
<br>
 
<br>
RECRUITING ELITE IT TALENT: 5:15 - 6:00 PM<br>
+
SOCIAL MEDIA, PRIVACY AND BREACHES<br>
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br>
+
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]<br>
 +
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]<br>
 
<br>
 
<br>
FOOD BREAK: 6:00 - 6:15 PM<br>
+
VANISH: MAKING DATA DISAPPEAR<br>
DETECTING BACKDOORS IN WEB APPLICATIONS: 6:15 - 7:00 PM<br>
+
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]<br>
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]<br>
+
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]<br>
 
<br>
 
<br>
 +
'''Agenda: Tuesday, November 17th 2009'''<br>
 
<br>
 
<br>
<b>JORDAN HABERFIELD</b><br>
+
ATTACK YOUR DATABASE BEFORE OTHERS DO<br>
System One provides technical outsourcing solutions to clients in the energy, engineering, information technology and scientific sectors. Combining national recruiting capabilities and local market expertise, we are the go-to, single source firm for clients looking to attract, select and retain a quality workforce.
+
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]<br>
 
+
System One advises clients on recruiting strategy and organizational effectiveness. We also help skilled professionals advance their careers. The result — carefully-matched hires, well-executed projects, and effective resource management.
+
<br><br><b>Chris Wysopal</b><br>
+
Chris Wysopal, Veracode’s CTO, is responsible for the company’s software security analysis capabilities. In 2008 he was named one of InfoWorld's Top 25 CTO's and one of the 100 most influential people in IT by eWeek. One of the original vulnerability researchers, he has testified on Capitol Hill in the US on the subjects of government computer security and how vulnerabilities are discovered in software. <br><br>
+
 
+
== Jun 10th 2009 ==
+
<paypal>Hartford</paypal><br>
+
We are seeking a sponsor for food and beverages. Alternatively donations are appreciated.<br>
+
 
+
OPENING REMARKS: 5:00 - 5:15 PM<br>
+
James McGovern, [http://duckdown.blogspot.com/ OWASP Hartford Chapter Leader]<br>
+
 
<br>
 
<br>
BEST PRACTICES FOR NETWORK SECURITY: IF YOU ONLY KNEW WHAT HACKERS CAN DO! : 5:15 - 6:00 PM<br>
+
'''Agenda: Tuesday, October 13th 2009'''<br>
Kent Browne, Security Solutions Architect for [http://www.ibm.com/ IBM]<br>
+
 
<br>
 
<br>
FOOD BREAK: 6:00 - 6:15 PM<br>
+
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING<br>
THE ANATOMY OF SECURITY DISASTERS: 6:15 - 7:00 PM<br>
+
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]<br>
Marcus Ranum CTO, [http://www.tenablesecurity.com/ Tenable Security]<br>
+
 
<br>
 
<br>
 +
'''Agenda: Monday, September 14th 2009'''<br>
 
<br>
 
<br>
<b>KENT BROWNE</b><br>
+
OWASP: WHERE WE ARE AND WHERE WE ARE GOING<br>
Noted participant in the security arena for over 20 years, Kent is widely recognized as an authority on security issues with unique perspectives on such topics as "the need for policies and procedures", "honeypots on the net", "protecting your children",
+
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]<br>
"hacktivism", "hackers and ethics", and many others. Featured guest on Television (BBC, RAI, ABC News, Silicon Spin, etc.), Radio and in magazines (Computer World, Business News, New York Times etc.) Kent is currently Security Solutions Architect for IBM.
+
<br><br><b>MARCUS RANUM</b><br>
+
Marcus J. Ranum, Chief Security Officer of Tenable Security, Inc., is a world-renowned expert on security system design and implementation. Since the late 1980's, he has designed a number of groundbreaking security products including the DEC SEAL, the TIS firewall toolkit, the Gauntlet firewall, and NFR's Network Flight Recorder intrusion detection system. He has been involved in every level of operations of a security product business, from developer, to founder and CEO of NFR. Marcus has served as a consultant to many FORTUNE 500 firms and national governments, as well as serving as a guest lecturer and instructor at numerous high-tech conferences.<br><br>
+
 
+
== OWASP AppSec Executive Summit (October 2009) ==
+
<paypal>Hartford</paypal><br>
+
Please visit our sponsors session, if you are interested in having a booth at this event<br>
+
 
+
 
<br>
 
<br>
FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 1:00 - 1:45 PM<br>
+
WEB APPLICATION SECURITY ASSURANCE<br>
Mary Ann Davidson, CISO of [http://www.oracle.com/ Oracle]<br>
+
Gregory Gotta, SVP Security [http://www.ca.com/ CA]<br>
 
<br>
 
<br>
OFFSHORING APPLICATION DEVELOPMENT: SECURITY IS STILL YOUR PROBLEM: 1:45 - 2:30 PM<br>
+
'''Agenda: Wednesday, June 10th 2009'''<br>
Rohyt Belani, [http://www.intrepidusgroup.com/ Intrepridus Group]<br>
+
 
<br>
 
<br>
The STATE OF SOFTWARE DEVELOPMENT: 2:45 - 3:30 PM<br>
+
THE ANATOMY OF SECURITY DISASTERS<br>
Grady Booch, Fellow at [http://www.ibm.com/ IBM]<br>
+
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]<br>
 +
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]<br>
 
<br>
 
<br>
INTO THE BREACH: A WAKEUP CALL FOR CORPORATE AMERICA: 3:30 - 4:15 PM<br>
+
'''Agenda: Tuesday, April 30th 2009'''<br>
Michael Santarcangelo, Chief Security Catalyst at [http://www.securitycatalyst.com/ Security Catalyst]<br>
+
 
<br>
 
<br>
 
+
RECRUITING ELITE IT TALENT<br>
'''MARY ANN DAVIDSON'''<br>
+
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br>
Mary Ann Davidson is the Chief Security Officer at Oracle Corporation, responsible for Oracle product security, as well as security evaluations, assessments and incident handling. She represents Oracle on the Board of Directors of the Information Technology Information Security Analysis Center (IT-ISAC)
+
<br>
 
+
DETECTING BACKDOORS IN WEB APPLICATIONS<br>
'''ROHYT BELANI'''<br>
+
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]<br>
Rohyt Belani is a Managing Partner and co-founder of the Intrepidus Group. Prior to founding the Intrepidus Group, Rohyt started and ran Mandiant’s New York City operations. During the last 7 years, he has worked at premier information security organizations like Foundstone and the US-CERT. Rohyt is a regular speaker at various industry conferences, including Black Hat, OWASP, Hack-In-The-Box, InfoSec World, and several forums catering to the FBI and US Secret Service agents. He currently teaches a class at Carnegie Mellon University, and has been invited to guest lecture at the University of Wisconsin on the topic of information security.  
+
 
+
'''GRADY BOOCH'''<br>
+
Grady Booch is recognized internationally for his innovative work on software architecture, modeling, and software engineering process. His work has improved the effectiveness of software developers worldwide. He has been with Rational Software Corporation as Chief Scientist since its founding in 1980. Grady is one of the original developers of the Unified Modeling Language (UML) and was also one of the original developers of several of Rational's products including Rational Rose. Grady has served as architect and architectural mentor for numerous complex software systems around the world.
+
 
+
'''MICHAEL SANTARCANGELO'''<br>
+
Michael Santarcangelo is a human catalyst*. An expert who speaks on information protection – including compliance, privacy and awareness – Michael energizes and inspires his audiences to change the way they protect information.
+
 
+
Michael is known for delivering simple and effective strategies that get results. He connects with audiences in a way that makes security relevant, easy to understand and achievable! With wit and clarity, he freely shares unique insights, innovative approaches and effective solutions that are informed by both experience and research.
+
 
+
== UPCOMING 2009 EVENTS ==
+
<paypal>Hartford</paypal><br>
+
 
+
'''June 2009'''
+
Kent Browne of IBM
+
Gerald Beuchelt of Sun
+
 
+
'''September 2009'''
+
 
+
FRAMEWORK-LEVEL THREAT ANALYSIS: ADDING SCIENCE TO THE ART OF SOURCE CODE REVIEW: 3:30 - 4:15 PM<br>
+
Rohit Sethi, [http://www.securitycompass.com/ Security Compass]<br>
+
 
<br>
 
<br>
 
'''ROHIT SETHI'''
 
 
Rohit Sethi, Manager of Professional Services, Security Compass, is a specialist in threat modeling, application security reviews, and building security controls into the software development life cycle (SDLC). Mr. Sethi is a frequent guest speaker and instructor at several conferences, including RSA, Shmoocon, and CSI. He has written articles for Security Focus and the Web Application Security Consortium (WASC), and has been quoted as an expert in application security for ITWorldCanada and Computer World.
 
 
At Security Compass, Rohit teaches students various topics on web application security in cities across North America. He has also managed and performed extensive threat analysis, source code reviews, and penetration testing for clients in financial services, utilities, telecommunications and healthcare.
 
 
He is often consulted for his dual expertise in information security and software engineering.
 
 
== WEB CONFERENCING INFORMATION ==
 
 
We are pleased to present all OWASP meetings via conference call. To listen, the dialin number is 1-218-936-4700 (Passcode 606183). The conference line has a limited number of caller slots, so please be considerate of others and share whenever possible.
 
 
== Call for Speakers ==
 
 
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.
 
 
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.
 
 
Some topics of interest for upcoming meetings include (but are not limited to):
 
* Breaking CAPTCHA
 
* Hacking Cardspace and Identity 2.0
 
* Breaking Commercial Software for Fun and Profit
 
* Tactics for breaking software licensing schemes
 
* Gaming, the next overlooked security hole
 
* Hacking Mainframes
 
* Database rootkits
 
 
== Past Events ==
 
 
 
'''Agenda: Monday, April 13th 2009'''<br>
 
'''Agenda: Monday, April 13th 2009'''<br>
 +
<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]
+
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]<br>
 
+
<br>
 
'''Agenda: Tuesday, February 10th 2009'''<br>
 
'''Agenda: Tuesday, February 10th 2009'''<br>
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)
+
<br>
Mary Ruddy, [http://www.meristic.com/index.php Meristic]
+
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)<br>
 
+
Mary Ruddy, [http://www.meristic.com/index.php Meristic]<br>
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS  
+
<br>
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]
+
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS <br>
 
+
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]<br>
STATE OF WEB APPLICATION SECURITY
+
<br>
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP  
+
STATE OF WEB APPLICATION SECURITY<br>
<br><br>
+
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP <br>
 +
<br>
 
'''Agenda: Wednesday, November 11th 2008'''<br>
 
'''Agenda: Wednesday, November 11th 2008'''<br>
 +
<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]
+
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]<br>
 
+
<br>
'''Agenda: Wednesday, September 24th 2008'''
+
'''Agenda: Wednesday, September 24th 2008'''<br>
 
+
<br>
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM
+
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM<br>
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]
+
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]<br>
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]
+
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]<br>
 
+
<br>
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM
+
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM<br>
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]
+
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]<br>
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]
+
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]<br>
 
+
<br>
 
+
'''Agenda: Wednesday, June 11th 2008'''<br>
'''Agenda: Wednesday, June 11th 2008'''
+
<br>
 
+
CARDSPACE AND USER CENTRIC IDENTITY<br>
CARDSPACE AND USER CENTRIC IDENTITY
+
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]<br>
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]
+
<br>
 
+
IDENTITY GOVERNANCE FRAMEWORK<br>
IDENTITY GOVERNANCE FRAMEWORK
+
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]<br>
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]
+
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]<br>
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]
+
<br>
 
+
'''Agenda: Wednesday, April 30th 2008'''<br>
 
+
<br>
'''Agenda: Wednesday, April 30th 2008'''
+
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES<br>
 
+
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]<br>
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES
+
<br>
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]
+
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE<br>
 
+
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]<br>
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE
+
<br>
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]
+
'''Agenda: Thursday, February 28th 2008'''<br>
 
+
<br>
 
+
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY<br>
'''Agenda: Thursday, February 28th 2008'''
+
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]<br>
 
+
<br>
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY
+
EXPLOITING ONLINE GAMES<br>
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]
+
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]<br>
 
+
<br>
EXPLOITING ONLINE GAMES
+
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]
+
  
 
== Locations ==
 
== Locations ==
Line 188: Line 155:
 
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.
 
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.
  
 +
[[Category:OWASP Chapter]]
 
[[Category:Connecticut]]
 
[[Category:Connecticut]]
 +
[[Category:Inactive Chapter]]

Revision as of 13:58, 28 November 2012

Contents

OWASP Hartford

Welcome to the Hartford chapter homepage. The chapter leader is James McGovern
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Sponsors

We would like to thank HP, Oracle, CA, and Microsoft for their generous sponsorship and helping make application security visible...

If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email James McGovern with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.



Call for Sponsors/Speakers

This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.

OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.

Some topics of interest for upcoming meetings include (but are not limited to):

  • Cloud Security with a focus on PAAS
  • Breaking CAPTCHA
  • Threat modeling
  • Mobile Security
  • Entitlements Management
  • Advanced Persistent Threats
  • Misuse/abuse cases for business analysts

Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. SUBMIT HERE

Past Events

Agenda: Wednesday, October 24th 2012
International Institute of Business Analysts (IIBA) Joint Meeting
James McGovern - Introduction to Security for Business Analysts
This meeting will be held at Chubb in Simsbury</br>

Agenda: Wednesday, September 26th 2012
Joint Meeting with OWASP Student Chapter
Introduction to Network Security
Anthony DAmato</br>

Agenda: Wednesday, May 23rd 2012
Introduction to SOA Security
James McGovern

Agenda: Tuesday, May 18th 2010
Joint Meeting with ISACA on the topic of auditing web applications

Dmitry Zhdanov presentation is located here
Mark Wireman presentation is located here
James Ritche presentation is located here
Mark Coderre presentation is located here

Agenda: Thursday, December 3rd 2009

SOCIAL MEDIA, PRIVACY AND BREACHES
Ian Glazer, Distinguished Industry Analyst Burton Group
Powerpoint presentation is located here

VANISH: MAKING DATA DISAPPEAR
George Dobbs, Chief Architect Knights of Columbus
Powerpoint presentation is located here

Agenda: Tuesday, November 17th 2009

ATTACK YOUR DATABASE BEFORE OTHERS DO
Todd Desantis, Lead Sales Engineer Sentrigo

Agenda: Tuesday, October 13th 2009

THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING
Michael Waidner, Distinguished IBM Engineer and Security CTO IBM

Agenda: Monday, September 14th 2009

OWASP: WHERE WE ARE AND WHERE WE ARE GOING
Tom Brennan, OWASP Board Member OWASP

WEB APPLICATION SECURITY ASSURANCE
Gregory Gotta, SVP Security CA

Agenda: Wednesday, June 10th 2009

THE ANATOMY OF SECURITY DISASTERS
Marcus Ranum, CSO of Tenable Security
Powerpoint presentation is located here

Agenda: Tuesday, April 30th 2009

RECRUITING ELITE IT TALENT
Jordan Haberfield (Agile Elephant), SVP of System One

DETECTING BACKDOORS IN WEB APPLICATIONS
Chris Wysopal CTO, Veracode

Agenda: Monday, April 13th 2009

AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM
Scott Ambler, Agile Practice Leader, IBM
Powerpoint presentation is located here

Agenda: Tuesday, February 10th 2009

OPEN SOURCE IDENTITY SERVICES (The Higgins Project)
Mary Ruddy, Meristic

ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS
Ramesh Nagappan, Security Architect at Sun Microsystems

STATE OF WEB APPLICATION SECURITY
Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP

Agenda: Wednesday, November 11th 2008

LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM
Richard Eisenberg, Architect at Voltage Security

Agenda: Wednesday, September 24th 2008

TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM
Paul Roberts, Industry Analyst, The 451 Group
Powerpoint presentation is located here

MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM
Andrew Stone, Senior Manager, Accenture
Powerpoint presentation is located here

Agenda: Wednesday, June 11th 2008

CARDSPACE AND USER CENTRIC IDENTITY
Chris Winn, Security Evangelist, Microsoft

IDENTITY GOVERNANCE FRAMEWORK
Prateek Mishra, Product Manager, Oracle
Powerpoint Presentation is here

Agenda: Wednesday, April 30th 2008

THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES
Anton Chuvakin, Chief Logging Evangelist, LogLogic

KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE
Jack Danahy, CTO and Founder, Ounce Labs

Agenda: Thursday, February 28th 2008

HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY
Chenxi Wang, Principal Analyst, Forrester Research

EXPLOITING ONLINE GAMES
Gary McGraw, CTO, Cigital

Locations

All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.