If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email James McGovern with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.
September 14th 2009
We are seeking a sponsor for food and beverages. Alternatively donations are appreciated.
Call for Speakers
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way.
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion.
Some topics of interest for upcoming meetings include (but are not limited to):
- Breaking CAPTCHA
- Hacking Cardspace and Identity 2.0
- Breaking Commercial Software for Fun and Profit
- Tactics for breaking software licensing schemes
- Gaming, the next overlooked security hole
- Hacking Mainframes
- Database rootkits
Agenda: Tuesday, April 30th 2009
RECRUITING ELITE IT TALENT Jordan Haberfield (Agile Elephant), SVP of System One
DETECTING BACKDOORS IN WEB APPLICATIONS Chris Wysopal CTO, Veracode
Agenda: Tuesday, February 10th 2009
OPEN SOURCE IDENTITY SERVICES (The Higgins Project) Mary Ruddy, Meristic
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS Ramesh Nagappan, Security Architect at Sun Microsystems
STATE OF WEB APPLICATION SECURITY
Gunnar Peterson, CTO of Artec Group and Twin Cities OWASP
Agenda: Wednesday, November 11th 2008
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM
Richard Eisenberg, Architect at Voltage Security
Agenda: Wednesday, September 24th 2008
Agenda: Wednesday, June 11th 2008
CARDSPACE AND USER CENTRIC IDENTITY Chris Winn, Security Evangelist, Microsoft
Agenda: Wednesday, April 30th 2008
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES Anton Chuvakin, Chief Logging Evangelist, LogLogic
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE Jack Danahy, CTO and Founder, Ounce Labs
Agenda: Thursday, February 28th 2008
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY Chenxi Wang, Principal Analyst, Forrester Research
EXPLOITING ONLINE GAMES Gary McGraw, CTO, Cigital
All meetings are held at the headquarters of The Hartford Financial Services Group (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.