Difference between revisions of "Hartford"

From OWASP
Jump to: navigation, search
(October 13th 2009)
(27 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}
+
{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}
  
<paypal>Hartford</paypal>
 
  
 
== Sponsors ==
 
== Sponsors ==
  
We would like to thank [http://www.ouncelabs.com/ Ounce Labs], [http://www.veracode.com/ Veracode], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...
+
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...
  
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
+
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
  
== September 14th 2009 ==
 
<paypal>Hartford</paypal><br>
 
We would like to thank CA for sponsoring food and beverages for this event<br>
 
 
OPENING REMARKS: 5:00 - 5:15 PM<br>
 
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]<br>
 
<br>
 
OWASP where we are and where we are going : 5:15 - 6:00 PM<br>
 
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]<br>
 
<br>
 
FOOD BREAK: 6:00 - 6:15 PM<br>
 
<br>
 
WEB APPLICATION SECURITY ASSURANCE: 6:15 - 7:00 PM<br>
 
Gregory Gotta, SVP Security [http://www.ca.com/ CA]<br>
 
<br>Any application that will face the harsh realities of the “front lines” in a web environment must be tried and true.  This is even more true when the application is a security product intended to protect whatever sits behind it.  This presentation will discuss not only the different methods that are used to insure this high degree of assurance, but also the risks and cost factors associated with this process helping customers and vendors alike to both understand and think about all facets of this process.
 
<br>
 
<br>
 
<b>Gregory Gotta</b><br>
 
Gregory Gotta has over 10 years of experience in the Internet Security arena and is currently the SVP of Engineering at CA for all initiatives delivered by the Security BU.  Products include market leaders in the WAM, SSO, Data Access, and SIM categories.  He has held this position since July 2007.  Prior to that he spent 7+ years at Symantec responsible for all Network/Gateway Security products.  This included Firewall/VPN (Raptor), Intrusion Prevention, Content Filtering, and Mail Gateway products.  While there he also lead the initiative to deliver the first multi-function appliance to market while driving a number of key acquisitions in this space.
 
 
== October 13th 2009 ==
 
<paypal>Hartford</paypal><br>
 
We would like to thank IBM for sponsoring food and beverages for this event<br>
 
 
OPENING REMARKS: 5:00 - 5:15 PM<br>
 
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]<br>
 
<br>
 
Cloud Security, a failure on day one! : 5:15 - 6:00 PM<br>
 
Gunnar Peterson, CTO [http://www.artecgroup.net/ Artec]<br>
 
<br>
 
FOOD BREAK: 6:00 - 6:15 PM<br>
 
<br>
 
The convergence of security and privacy: 6:15 - 7:00 PM<br>
 
Michael Waidner, CTO for Security and Distiguished Engineer [http://www.ibm.com/ IBM]<br>
 
<br>
 
'''Gunnar Peterson''' is a visiting scientist at Carnegie Mellon University’s Software Engineering Institute, and a project leader for several OWASP projects on Web Services Security.  He maintains an information security blog at http://1raindrop.typepad.com.
 
 
<br><br>
 
<br><br>
'''Michael Waidner''' is a Distinguished IBM Engineer with a impressive Security Background and History at IBM as a researcher. He currently leads a number of groups and is the Chariman of IBM's Security Architecture Board.  Under his leadership the team made numerous fundamental contributions to science and IBM's product and services portfolio, in areas such as cryptography, fault tolerance in distributed systems, federated identity management, enterprise privacy management, security governance and risk management. He is a member of the IBM Academy of Technology, a Fellow of the IEEE, and an ACM Distinguished Scientist.
 
 
== November 17th 2009 ==
 
<paypal>Hartford</paypal><br>
 
We would like to thank Sentrigo for sponsoring food and beverages for this event<br>
 
 
OPENING REMARKS: 5:00 - 5:15 PM<br>
 
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]<br>
 
<br>
 
Attack your database before others do : 5:15 - 6:00 PM<br>
 
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]<br>
 
<br>
 
In this presentation, we will show typical security flaws found in PL/SQL and Java code due to programmer mistakes. We will demonstrate how to use existing open-source scanning and fuzzing tools to automatically find and flag such flaws, and also demonstrate how creating your own tools in PL/SQL can help you keep your code secure.
 
 
You will learn:<br>
 
1. Common security mistakes developers make<br>
 
2. How to use open source tools to find those mistakes<br>
 
3. How to roll out your own PL/SQL fuzzer<br>
 
<br><br>
 
FOOD BREAK: 6:00 - 6:15 PM<br>
 
<br>
 
Project Aristotle: 6:30 - 7:30 PM<br>
 
Phil Hunt, Project Lead [http://www.ibm.com/ Oracle]<br>
 
<br>
 
'''Todd P. Desantis''' Todd DeSantis brings a wealth of technical knowledge and a passion for using technology to better society to his position as lead North American Sales Engineer at Sentrigo. With a background in computer science from Worcester Polytechnic Institute, Todd has been using his understanding of computer programming and database systems throughout his career. At Sentrigo Todd is striving to bring a higher level of database security and safety to the enterprise. Prior to Sentrigo Todd successfully helped Fortune 50 companies rethink data access paradigms with Endeca Technologies. Todd started his career at Enerjy Technologies where he helped organizations improve overall levels of Java code quality and visibility. In his spare time Todd, an avid audiophile, enjoys working toward creating the 'absolute sound' with hi-fi audio systems, and enjoys many different genres of music.
 
<br><br>
 
'''Phil Hunt''' in his day job work on identity management standards for Oracle. He is particularly interested in issues of identity privacy and governance.
 
  
 
== Call for Sponsors/Speakers ==
 
== Call for Sponsors/Speakers ==
Line 81: Line 17:
  
 
Some topics of interest for upcoming meetings include (but are not limited to):
 
Some topics of interest for upcoming meetings include (but are not limited to):
* Agile Software Development and Security
+
* Cloud Security with a focus on PAAS
 
* Breaking CAPTCHA
 
* Breaking CAPTCHA
* Hacking Cardspace and Identity 2.0
+
* Threat modeling
* Breaking Commercial Software for Fun and Profit
+
* Mobile Security
* Tactics for breaking software licensing schemes
+
* Entitlements Management
* Gaming, the next overlooked security hole
+
* Advanced Persistent Threats
* Hacking Mainframes/RACF
+
* Database rootkits
+
* PCI/DSS Compliance
+
* Privacy considerations in software development
+
  
<paypal>Hartford</paypal>
+
== Upcoming Events ==
 +
 
 +
'''Agenda: Tuesday, June 25th 2013'''<br>
 +
Building a Better Botnet<br>
 +
Michael Smith, Akamai<br>
 +
5:00 PM to 7:00 PM<br>
 +
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)
 +
 
 +
== Postponed Events ==
 +
 
 +
'''Agenda: Tuesday, April 16th 2013'''<br>
 +
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations <br>
 +
Gene Kim - CTO of Tripwire<br>
 +
This meeting will be held at Travelers in Downtown Hartford</br>
  
 
== Past Events ==
 
== Past Events ==
  
'''Agenda: Wednesday, June 10th 2009'''<br>
+
'''Agenda: Tuesday, May 6th 2013'''<br>
THE ANATOMY OF SECURITY DISASTERS
+
Web Services Security<br>
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]
+
James McGovern, HP Enterprise Services<br>
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]
+
This meeting will be held at the ACORD LOMA Forum in Las Vegas
 +
<br><br>
 +
'''Agenda: Wednesday, April 24th 2013'''<br>
 +
Cloud and Identity<br>
 +
George Dobbs, Enterprise Architect - MassMutual<br>
 +
8:30 AM to Noon<br>
 +
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)
  
'''Agenda: Tuesday, April 30th 2009'''<br>
+
'''Agenda: Wednesday, October 24th 2012'''<br>
RECRUITING ELITE IT TALENT
+
International Institute of Business Analysts (IIBA) Joint Meeting<br>
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]
+
James McGovern - Introduction to Security for Business Analysts<br>
 +
This meeting was held at Chubb in Simsbury</br>
  
DETECTING BACKDOORS IN WEB APPLICATIONS
+
'''Agenda: Wednesday, September 26th 2012'''<br>
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]
+
Joint Meeting with OWASP Student Chapter<br>
 +
Introduction to Network Security<br>
 +
Anthony DAmato</br>
  
 +
'''Agenda: Wednesday, May 23rd 2012'''<br>
 +
Introduction to SOA Security<br>
 +
James McGovern<br>
 +
 +
'''Agenda: Tuesday, May 18th 2010'''<br>
 +
Joint Meeting with ISACA on the topic of auditing web applications<br>
 +
 +
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]<br>
 +
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]<br>
 +
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]<br>
 +
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]<br>
 +
 +
'''Agenda: Thursday, December 3rd 2009'''<br>
 +
<br>
 +
SOCIAL MEDIA, PRIVACY AND BREACHES<br>
 +
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]<br>
 +
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]<br>
 +
<br>
 +
VANISH: MAKING DATA DISAPPEAR<br>
 +
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]<br>
 +
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]<br>
 +
<br>
 +
'''Agenda: Tuesday, November 17th 2009'''<br>
 +
<br>
 +
ATTACK YOUR DATABASE BEFORE OTHERS DO<br>
 +
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]<br>
 +
<br>
 +
'''Agenda: Tuesday, October 13th 2009'''<br>
 +
<br>
 +
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING<br>
 +
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]<br>
 +
<br>
 +
'''Agenda: Monday, September 14th 2009'''<br>
 +
<br>
 +
OWASP: WHERE WE ARE AND WHERE WE ARE GOING<br>
 +
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]<br>
 +
<br>
 +
WEB APPLICATION SECURITY ASSURANCE<br>
 +
Gregory Gotta, SVP Security [http://www.ca.com/ CA]<br>
 +
<br>
 +
'''Agenda: Wednesday, June 10th 2009'''<br>
 +
<br>
 +
THE ANATOMY OF SECURITY DISASTERS<br>
 +
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]<br>
 +
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]<br>
 +
<br>
 +
'''Agenda: Tuesday, April 30th 2009'''<br>
 +
<br>
 +
RECRUITING ELITE IT TALENT<br>
 +
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br>
 +
<br>
 +
DETECTING BACKDOORS IN WEB APPLICATIONS<br>
 +
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]<br>
 +
<br>
 
'''Agenda: Monday, April 13th 2009'''<br>
 
'''Agenda: Monday, April 13th 2009'''<br>
 +
<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]
+
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]<br>
 
+
<br>
 
'''Agenda: Tuesday, February 10th 2009'''<br>
 
'''Agenda: Tuesday, February 10th 2009'''<br>
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)
+
<br>
Mary Ruddy, [http://www.meristic.com/index.php Meristic]
+
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)<br>
 
+
Mary Ruddy, [http://www.meristic.com/index.php Meristic]<br>
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS  
+
<br>
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]
+
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS <br>
 
+
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]<br>
STATE OF WEB APPLICATION SECURITY
+
<br>
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP  
+
STATE OF WEB APPLICATION SECURITY<br>
<br><br>
+
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP <br>
 +
<br>
 
'''Agenda: Wednesday, November 11th 2008'''<br>
 
'''Agenda: Wednesday, November 11th 2008'''<br>
 +
<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]
+
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]<br>
 
+
<br>
'''Agenda: Wednesday, September 24th 2008'''
+
'''Agenda: Wednesday, September 24th 2008'''<br>
 
+
<br>
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM
+
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM<br>
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]
+
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]<br>
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]
+
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]<br>
 
+
<br>
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM
+
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM<br>
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]
+
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]<br>
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]
+
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]<br>
 
+
<br>
'''Agenda: Wednesday, June 11th 2008'''
+
'''Agenda: Wednesday, June 11th 2008'''<br>
 
+
<br>
CARDSPACE AND USER CENTRIC IDENTITY
+
CARDSPACE AND USER CENTRIC IDENTITY<br>
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]
+
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]<br>
 
+
<br>
IDENTITY GOVERNANCE FRAMEWORK
+
IDENTITY GOVERNANCE FRAMEWORK<br>
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]
+
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]<br>
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]
+
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]<br>
 
+
<br>
 
+
'''Agenda: Wednesday, April 30th 2008'''<br>
'''Agenda: Wednesday, April 30th 2008'''
+
<br>
 
+
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES<br>
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES
+
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]<br>
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]
+
<br>
 
+
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE<br>
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE
+
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]<br>
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]
+
<br>
 
+
'''Agenda: Thursday, February 28th 2008'''<br>
 
+
<br>
'''Agenda: Thursday, February 28th 2008'''
+
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY<br>
 
+
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]<br>
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY
+
<br>
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]
+
EXPLOITING ONLINE GAMES<br>
 
+
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]<br>
EXPLOITING ONLINE GAMES
+
<br>
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]
+
  
 
== Locations ==
 
== Locations ==
Line 168: Line 178:
 
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.
 
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.
  
<paypal>Hartford</paypal>
+
[[Category:OWASP Chapter]]
 
+
 
[[Category:Connecticut]]
 
[[Category:Connecticut]]

Revision as of 08:23, 14 June 2013

Contents

OWASP Hartford

Welcome to the Hartford chapter homepage. The chapter leaders are James McGovern and Narendra Patlolla
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Sponsors

We would like to thank HP, Travelers, Oracle, CA, and Microsoft for their generous sponsorship and helping make application security visible...

If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email James McGovern with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.



Call for Sponsors/Speakers

This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.

OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.

Some topics of interest for upcoming meetings include (but are not limited to):

  • Cloud Security with a focus on PAAS
  • Breaking CAPTCHA
  • Threat modeling
  • Mobile Security
  • Entitlements Management
  • Advanced Persistent Threats

Upcoming Events

Agenda: Tuesday, June 25th 2013
Building a Better Botnet
Michael Smith, Akamai
5:00 PM to 7:00 PM
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)

Postponed Events

Agenda: Tuesday, April 16th 2013
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations
Gene Kim - CTO of Tripwire
This meeting will be held at Travelers in Downtown Hartford</br>

Past Events

Agenda: Tuesday, May 6th 2013
Web Services Security
James McGovern, HP Enterprise Services
This meeting will be held at the ACORD LOMA Forum in Las Vegas

Agenda: Wednesday, April 24th 2013
Cloud and Identity
George Dobbs, Enterprise Architect - MassMutual
8:30 AM to Noon
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)

Agenda: Wednesday, October 24th 2012
International Institute of Business Analysts (IIBA) Joint Meeting
James McGovern - Introduction to Security for Business Analysts
This meeting was held at Chubb in Simsbury</br>

Agenda: Wednesday, September 26th 2012
Joint Meeting with OWASP Student Chapter
Introduction to Network Security
Anthony DAmato</br>

Agenda: Wednesday, May 23rd 2012
Introduction to SOA Security
James McGovern

Agenda: Tuesday, May 18th 2010
Joint Meeting with ISACA on the topic of auditing web applications

Dmitry Zhdanov presentation is located here
Mark Wireman presentation is located here
James Ritche presentation is located here
Mark Coderre presentation is located here

Agenda: Thursday, December 3rd 2009

SOCIAL MEDIA, PRIVACY AND BREACHES
Ian Glazer, Distinguished Industry Analyst Burton Group
Powerpoint presentation is located here

VANISH: MAKING DATA DISAPPEAR
George Dobbs, Chief Architect Knights of Columbus
Powerpoint presentation is located here

Agenda: Tuesday, November 17th 2009

ATTACK YOUR DATABASE BEFORE OTHERS DO
Todd Desantis, Lead Sales Engineer Sentrigo

Agenda: Tuesday, October 13th 2009

THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING
Michael Waidner, Distinguished IBM Engineer and Security CTO IBM

Agenda: Monday, September 14th 2009

OWASP: WHERE WE ARE AND WHERE WE ARE GOING
Tom Brennan, OWASP Board Member OWASP

WEB APPLICATION SECURITY ASSURANCE
Gregory Gotta, SVP Security CA

Agenda: Wednesday, June 10th 2009

THE ANATOMY OF SECURITY DISASTERS
Marcus Ranum, CSO of Tenable Security
Powerpoint presentation is located here

Agenda: Tuesday, April 30th 2009

RECRUITING ELITE IT TALENT
Jordan Haberfield (Agile Elephant), SVP of System One

DETECTING BACKDOORS IN WEB APPLICATIONS
Chris Wysopal CTO, Veracode

Agenda: Monday, April 13th 2009

AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM
Scott Ambler, Agile Practice Leader, IBM
Powerpoint presentation is located here

Agenda: Tuesday, February 10th 2009

OPEN SOURCE IDENTITY SERVICES (The Higgins Project)
Mary Ruddy, Meristic

ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS
Ramesh Nagappan, Security Architect at Sun Microsystems

STATE OF WEB APPLICATION SECURITY
Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP

Agenda: Wednesday, November 11th 2008

LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM
Richard Eisenberg, Architect at Voltage Security

Agenda: Wednesday, September 24th 2008

TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM
Paul Roberts, Industry Analyst, The 451 Group
Powerpoint presentation is located here

MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM
Andrew Stone, Senior Manager, Accenture
Powerpoint presentation is located here

Agenda: Wednesday, June 11th 2008

CARDSPACE AND USER CENTRIC IDENTITY
Chris Winn, Security Evangelist, Microsoft

IDENTITY GOVERNANCE FRAMEWORK
Prateek Mishra, Product Manager, Oracle
Powerpoint Presentation is here

Agenda: Wednesday, April 30th 2008

THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES
Anton Chuvakin, Chief Logging Evangelist, LogLogic

KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE
Jack Danahy, CTO and Founder, Ounce Labs

Agenda: Thursday, February 28th 2008

HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY
Chenxi Wang, Principal Analyst, Forrester Research

EXPLOITING ONLINE GAMES
Gary McGraw, CTO, Cigital

Locations

All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.