Difference between revisions of "Kansas City"

From OWASP
Jump to: navigation, search
(Upcoming Meetings)
(Past Meetings)
(15 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter after reading this page, please send an email to our chapter leader [mailto:caughron@gmail.com Mat Caughron]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}
 
{{Chapter Template|chaptername=Kansas City|extra=If you have any questions about the Kansas City Chapter after reading this page, please send an email to our chapter leader [mailto:caughron@gmail.com Mat Caughron]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-kansascity|emailarchives=http://lists.owasp.org/pipermail/owasp-kansascity}}
  
<paypal>Kansas City</paypal>
+
 
  
 
== Upcoming Meetings ==
 
== Upcoming Meetings ==
  
 
'''Date:'''  
 
'''Date:'''  
Jan-Feb 2012
+
Thurs, June 20, 2013<br>
 +
6:30 PM
  
'''Location:'''
+
'''Location: (confirmed)'''
 +
Johnson County Community College<br>
 +
Regnier Center Room 344.
  
Location: Johnson County Community College Regnier Center room to be announced
+
'''Meeting Topic:'''
Johnson County Community College
+
Adding Risk Analysis and KPI Reporting to Your WebApp/Vuln Scanning
12345 College Boulevard
+
<br>
Overland Park, Kansas 66210
+
<br>
http://www.jccc.edu/maps/index.html
+
Discovering your enterprise vulnerabilities has become much easier with scanning tools. However, many organizations still struggle with handling the vulnerabilities that have been identified. Which ones should we fix first, and which ones can we ignore? Who should be responsible for the remediation task, and how can we hold them accountable? These questions and others common struggles for organizations large and not-so-large. In this presentation, we will look at:
<br>
+
<br>Methods to consolidate and de-duplicate scanning results from leading security tools,
 +
<br>Automatically correlate results with assets, incidents, controls, policies, and other compliance/security data,
 +
<br>Conduct risk scoring of each vulnerability and calculate inherent/residual risk scores for the vulnerability, asset, system, facility, and other records,
 +
<br>Assign remediation workflow for vulnerabilities and hold owners accountable,
 +
<br>Correlate scanning results with industry feeds such as US-CERT's NVD and iDefense,
 +
<br>Report on Key Performance Indicators (KPIs) such as workflow performance, trends per webapp/platform/Business Unit/Facility, and other categories.
  
 +
'''Speaker Bio:'''
 +
<br>
 +
Larry Slobodzian is a Senior Solution Engineer at LockPath and an Adjunct Professor of Information Systems at Baker University. With over 16 years of networking, compliance, and security experience, Larry has broad experience with solving complex business problems leveraging technology. He is a Veteran Marine with an MBA and technical certifications, making him one of the most dangerous Doctor Who fans in Kansas City.
  
 
+
<br>
'''Meeting Topic:'''
+
to be determined
+
 
<br>
 
<br>
  
<br><br>
 
As usual, bring your questions for the speaker and about software
 
security topics, as it is customary to have a lively Q&A following the
 
talk.
 
<br><br>
 
  
 +
 +
<br><br>
  
  
Line 41: Line 47:
 
== Past Meetings ==
 
== Past Meetings ==
 
Thanks to the speakers for sharing with us at our past chapter meetings.  Any presentation handouts or associated documents are shared through the following meeting summaries:
 
Thanks to the speakers for sharing with us at our past chapter meetings.  Any presentation handouts or associated documents are shared through the following meeting summaries:
 +
*[[Kansas_City_June_2013_Meeting|June 2013 Meeting]]
 +
*[[Kansas_City_JApril_2013_Meeting|April 2013 Meeting]]
 +
*[[Kansas_City_Jan_2013_Meeting|January 2013 Meeting]]
 +
*[[Kansas_City_Sept_2012_Meeting|September 2012 Meeting]]
 +
*[[Kansas_City_June_21_2012_Meeting|June 21 2012 Meeting]]
 +
*[[Kansas_City_April_2012_Meeting|April 2012 Meeting]]
 +
*[[Kansas_City_February_2012_Meeting|February 2012 Meeting]]
 
*[[Kansas_City_November_17_2011_Meeting|November 17 2011 Meeting]]
 
*[[Kansas_City_November_17_2011_Meeting|November 17 2011 Meeting]]
 
*[[Kansas_City_November_10_2011_Meeting|November 10 2011 Meeting]]
 
*[[Kansas_City_November_10_2011_Meeting|November 10 2011 Meeting]]

Revision as of 16:20, 30 May 2013

Contents

OWASP Kansas City

Welcome to the Kansas City chapter homepage. If you have any questions about the Kansas City Chapter after reading this page, please send an email to our chapter leader Mat Caughron
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Upcoming Meetings

Date: Thurs, June 20, 2013
6:30 PM

Location: (confirmed) Johnson County Community College
Regnier Center Room 344.

Meeting Topic: Adding Risk Analysis and KPI Reporting to Your WebApp/Vuln Scanning

Discovering your enterprise vulnerabilities has become much easier with scanning tools. However, many organizations still struggle with handling the vulnerabilities that have been identified. Which ones should we fix first, and which ones can we ignore? Who should be responsible for the remediation task, and how can we hold them accountable? These questions and others common struggles for organizations large and not-so-large. In this presentation, we will look at:
Methods to consolidate and de-duplicate scanning results from leading security tools,
Automatically correlate results with assets, incidents, controls, policies, and other compliance/security data,
Conduct risk scoring of each vulnerability and calculate inherent/residual risk scores for the vulnerability, asset, system, facility, and other records,
Assign remediation workflow for vulnerabilities and hold owners accountable,
Correlate scanning results with industry feeds such as US-CERT's NVD and iDefense,
Report on Key Performance Indicators (KPIs) such as workflow performance, trends per webapp/platform/Business Unit/Facility, and other categories.

Speaker Bio:
Larry Slobodzian is a Senior Solution Engineer at LockPath and an Adjunct Professor of Information Systems at Baker University. With over 16 years of networking, compliance, and security experience, Larry has broad experience with solving complex business problems leveraging technology. He is a Veteran Marine with an MBA and technical certifications, making him one of the most dangerous Doctor Who fans in Kansas City.







Please note:

  • Attendance at an OWASP chapter meeting is free and open to anyone interested in web application security
  • No registration is required, although RSVPs to the chapter leader are appreciated
  • Professionals with CISSPs, or other certifications, can earn CPE credits by attending


We meet at least once a quarter to discuss application security. If you have an interesting topic you'd like to present or discuss at future meetings, please send an email to caughron[at]gmail com. Or, get a discussion going by posting a message to our mailing list.

Past Meetings

Thanks to the speakers for sharing with us at our past chapter meetings. Any presentation handouts or associated documents are shared through the following meeting summaries: