Difference between revisions of "Hartford"

From OWASP
Jump to: navigation, search
(Past Events)
(Past Events)
Line 54: Line 54:
 
== Past Events ==
 
== Past Events ==
  
'''Agenda: Thursday, December 3rd 2009'''
+
'''Agenda: Thursday, December 3rd 2009'''<br>
Social Media, Privacy and Data Breaches<br>
+
SOCIAL MEDIA, PRIVACY AND BREACHES<br>
 
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]<br>
 
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]<br>
 
<br>
 
<br>
Vanish: Making Data Disappear<br>
+
VANISH: MAKING DATA DISAPPEAR<br>
 
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]<br>
 
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]<br>
 
<br>
 
<br>
'''Agenda: Tuesday, November 17th 2009'''
+
'''Agenda: Tuesday, November 17th 2009'''<br>
Attack your database before others do<br>
+
ATTACK YOUR DATABASE BEFORE OTHERS DO<br>
 
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]<br>
 
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]<br>
 
<br>
 
<br>
'''Agenda: Tuesday, October 13th 2009'''
+
'''Agenda: Tuesday, October 13th 2009'''<br>
The Convergence of Security and Privacy: Cloud Computing<br>
+
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING<br>
 
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]<br>
 
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]<br>
 
<br>
 
<br>
'''Agenda: Monday, September 14th 2009'''
+
'''Agenda: Monday, September 14th 2009'''<br>
OWASP: Where we are and where are we going<br>
+
OWASP: WHERE WE ARE AND WHERE WE ARE GOING<br>
 
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]<br>
 
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]<br>
 
<br>
 
<br>
Line 78: Line 78:
 
Gregory Gotta, SVP Security [http://www.ca.com/ CA]<br>
 
Gregory Gotta, SVP Security [http://www.ca.com/ CA]<br>
 
<br>
 
<br>
'''Agenda: Wednesday, June 10th 2009'''
+
'''Agenda: Wednesday, June 10th 2009'''<br>
 
THE ANATOMY OF SECURITY DISASTERS<br>
 
THE ANATOMY OF SECURITY DISASTERS<br>
 
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]<br>
 
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]<br>
 
<br>
 
<br>
'''Agenda: Tuesday, April 30th 2009'''
+
'''Agenda: Tuesday, April 30th 2009'''<br>
 
RECRUITING ELITE IT TALENT<br>
 
RECRUITING ELITE IT TALENT<br>
 
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br>
 
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]<br>
Line 90: Line 90:
 
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]<br>
 
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]<br>
 
<br>
 
<br>
'''Agenda: Monday, April 13th 2009'''
+
'''Agenda: Monday, April 13th 2009'''<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
 
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]<br>
 
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]<br>
 
<br>
 
<br>
'''Agenda: Tuesday, February 10th 2009'''
+
'''Agenda: Tuesday, February 10th 2009'''<br>
 
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)<br>
 
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)<br>
 
Mary Ruddy, [http://www.meristic.com/index.php Meristic]<br>
 
Mary Ruddy, [http://www.meristic.com/index.php Meristic]<br>
Line 105: Line 105:
 
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP <br>
 
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP <br>
 
<br>
 
<br>
'''Agenda: Wednesday, November 11th 2008'''
+
'''Agenda: Wednesday, November 11th 2008'''<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
 
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM<br>
 
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]<br>
 
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]<br>
 
<br>
 
<br>
'''Agenda: Wednesday, September 24th 2008'''
+
'''Agenda: Wednesday, September 24th 2008'''<br>
 
<br>
 
<br>
 
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM<br>
 
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM<br>
Line 119: Line 119:
 
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]<br>
 
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]<br>
 
<br>
 
<br>
'''Agenda: Wednesday, June 11th 2008'''
+
'''Agenda: Wednesday, June 11th 2008'''<br>
 
<br>
 
<br>
 
CARDSPACE AND USER CENTRIC IDENTITY<br>
 
CARDSPACE AND USER CENTRIC IDENTITY<br>
Line 128: Line 128:
 
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]<br>
 
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]<br>
 
<br>
 
<br>
'''Agenda: Wednesday, April 30th 2008'''
+
'''Agenda: Wednesday, April 30th 2008'''<br>
 
<br>
 
<br>
 
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES<br>
 
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES<br>
Line 136: Line 136:
 
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]<br>
 
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]<br>
 
<br>
 
<br>
'''Agenda: Thursday, February 28th 2008'''
+
'''Agenda: Thursday, February 28th 2008'''<br>
 
<br>
 
<br>
 
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY<br>
 
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY<br>

Revision as of 18:10, 6 December 2009

Contents

OWASP Hartford

Welcome to the Hartford chapter homepage. The chapter leader is James McGovern
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Hartford.

Sponsors

We would like to thank Tek Systems, Oracle, CA, The Hartford and Microsoft for their generous sponsorship and helping make application security visible...

If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email James McGovern with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.

Tuesday, February 16th 2010

funds to OWASP earmarked for Hartford.

We are seeking sponsorship for food and beverages for this event

OPENING REMARKS: 5:00 - 5:15 PM
James McGovern, OWASP Hartford Chapter Leader

Data Environmentalism: Rethinking our Approach to Data : 5:15 - 6:00 PM
Trevor Hughes, CTO Artec

FOOD BREAK: 6:00 - 6:15 PM
J. Trevor Hughes is the Executive Director of the International Association of Privacy Professionals (IAPP). In this role, Hughes leads the world’s largest association of privacy professionals.

Tuesday, April 20th 2010

funds to OWASP earmarked for Hartford.

Mary Ann Davidson, CSO of Oracle

Thursday, July 22nd 2010

funds to OWASP earmarked for Hartford.

TBD

Call for Sponsors/Speakers

This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.

OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.

Some topics of interest for upcoming meetings include (but are not limited to):

  • Agile Software Development and Security
  • Breaking CAPTCHA
  • Hacking Cardspace and Identity 2.0
  • Breaking Commercial Software for Fun and Profit
  • Tactics for breaking software licensing schemes
  • Gaming, the next overlooked security hole
  • Hacking Mainframes/RACF
  • Database rootkits
  • PCI/DSS Compliance
  • Privacy considerations in software development

funds to OWASP earmarked for Hartford.

Past Events

Agenda: Thursday, December 3rd 2009
SOCIAL MEDIA, PRIVACY AND BREACHES
Ian Glazer, Distinguished Industry Analyst Burton Group
Powerpoint presentation is located here

VANISH: MAKING DATA DISAPPEAR
George Dobbs, Chief Architect Knights of Columbus
Powerpoint presentation is located here

Agenda: Tuesday, November 17th 2009
ATTACK YOUR DATABASE BEFORE OTHERS DO
Todd Desantis, Lead Sales Engineer Sentrigo

Agenda: Tuesday, October 13th 2009
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING
Michael Waidner, Distinguished IBM Engineer and Security CTO IBM

Agenda: Monday, September 14th 2009
OWASP: WHERE WE ARE AND WHERE WE ARE GOING
Tom Brennan, OWASP Board Member OWASP

WEB APPLICATION SECURITY ASSURANCE
Gregory Gotta, SVP Security CA

Agenda: Wednesday, June 10th 2009
THE ANATOMY OF SECURITY DISASTERS
Marcus Ranum, CSO of Tenable Security
Powerpoint presentation is located here

Agenda: Tuesday, April 30th 2009
RECRUITING ELITE IT TALENT
Jordan Haberfield (Agile Elephant), SVP of System One

DETECTING BACKDOORS IN WEB APPLICATIONS
Chris Wysopal CTO, Veracode

Agenda: Monday, April 13th 2009
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM
Scott Ambler, Agile Practice Leader, IBM
Powerpoint presentation is located here

Agenda: Tuesday, February 10th 2009
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)
Mary Ruddy, Meristic

ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS
Ramesh Nagappan, Security Architect at Sun Microsystems

STATE OF WEB APPLICATION SECURITY
Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP

Agenda: Wednesday, November 11th 2008
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM
Richard Eisenberg, Architect at Voltage Security

Agenda: Wednesday, September 24th 2008

TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM
Paul Roberts, Industry Analyst, The 451 Group
Powerpoint presentation is located here

MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM
Andrew Stone, Senior Manager, Accenture
Powerpoint presentation is located here

Agenda: Wednesday, June 11th 2008

CARDSPACE AND USER CENTRIC IDENTITY
Chris Winn, Security Evangelist, Microsoft

IDENTITY GOVERNANCE FRAMEWORK
Prateek Mishra, Product Manager, Oracle
Powerpoint Presentation is here

Agenda: Wednesday, April 30th 2008

THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES
Anton Chuvakin, Chief Logging Evangelist, LogLogic

KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE
Jack Danahy, CTO and Founder, Ounce Labs

Agenda: Thursday, February 28th 2008

HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY
Chenxi Wang, Principal Analyst, Forrester Research

EXPLOITING ONLINE GAMES
Gary McGraw, CTO, Cigital

Locations

All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.

funds to OWASP earmarked for Hartford.