Difference between revisions of "Long Island"

From OWASP
Jump to: navigation, search
Line 7: Line 7:
 
==== News & Chapter Meeting  ====
 
==== News & Chapter Meeting  ====
  
'''IMPORTANT UPDATED - Our Long Island Chapter meeting is now scheduled for:''' <br> <br>
+
'''Thank You to all those who attended last weeks chapter meeting, and helped make it a success.  The next meeting has been planned for November.  More details will be posted soon.''' <br> <br>
  
* Date: Thursday, September 22
+
* Date: Thursday, November 17
* Location: Student Center room # 127, Hofstra University, Hempstead, NY
+
* Location: Adelphi University
 
* Time: 6:30pm-9:30pm
 
* Time: 6:30pm-9:30pm
* Agenda:  
+
* Agenda: TBD
 +
*Pizza and refreshments will be provided.
 +
----
  
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' <br>
+
'''Call For Topics & Speakers''' <br><br>
Helen will discuss one of the most widespread Web application Vulnerabilities. How can an application be attacked and how to protect yourself.
+
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].
  
<br>
 
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.
 
  
 
 
'''Round Table Discussions Coordinated by Ryan Behan:''' <br>
 
Topics -
 
Recent Attack on Infraguard Website.
 
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?
 
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?
 
<br><br>
 
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.
 
 
<!-- ---- -->
 
 
<!-- '''Call For Topics & Speakers''' <br><br>
 
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. -->
 
 
*Pizza and refreshments will be provided.
 
  
 
<br>
 
<br>
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]
+
<!-- RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif] -->
 
<br>
 
<br>
  
<br><br> Directions to Hofstra University (It is just off of Hempstead Turnpike): <!--To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. --> From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building. [http://maps.google.com/maps?hl=en&biw=1219&bih=809&um=1&ie=UTF-8&cid=0,0,18137204279734354163&fb=1&hq=hofstra+university&hnear=Old+Westbury,+NY&gl=us&daddr=Hofstra+University,+Hempstead,+NY+11549-1000&geocode=1582588550823583642,40.714111,-73.600523&ei=1ZixTb2EOeTs0gH3m7SLCQ&sa=X&oi=local_result&ct=directions-to&resnum=2&ved=0CB8QngIwAQ Map]
+
<!-- <br><br> Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. [http://maps.google.com/maps?hl=en&biw=1219&bih=809&um=1&ie=UTF-8&cid=0,0,18137204279734354163&fb=1&hq=hofstra+university&hnear=Old+Westbury,+NY&gl=us&daddr=Hofstra+University,+Hempstead,+NY+11549-1000&geocode=1582588550823583642,40.714111,-73.600523&ei=1ZixTb2EOeTs0gH3m7SLCQ&sa=X&oi=local_result&ct=directions-to&resnum=2&ved=0CB8QngIwAQ Map] -->
  
  
Line 55: Line 39:
  
 
----
 
----
 
+
<br> Thursday, November 17
<br> Thursday, September 22 <br>
+
  
 
*Time: 6:30pm-9:30pm <br>  
 
*Time: 6:30pm-9:30pm <br>  
*Location: Hofstra University <br>  
+
*Location: TBD <br>  
 
*Topics: TBD <br>
 
*Topics: TBD <br>
 
<br>
 
  
 
----
 
----
  
<br> Sunday, November 13
 
  
*Time: 12:30pm-3:30pm <br>
 
*Location: TBD <br>
 
*Topics: TBD <br>
 
 
<br>
 
  
 
<br>  
 
<br>  
Line 78: Line 53:
 
==== Past Meetings  ====
 
==== Past Meetings  ====
  
'''May Meeting'''
+
'''September'''
 +
*Date: Thursday, September 22, 2011
 +
*Time: 6:30pm - 9:30pm
 +
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000
 +
*Topics & Speakers: <br>
 +
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' <br>
 +
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.
 +
 
 +
<br>
 +
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.
 +
 
 +
 
 +
 
 +
'''Round Table Discussions Coordinated by Ryan Behan:''' <br>
 +
Topics -
 +
Recent Attack on Infraguard Website.
 +
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?
 +
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?
 +
<br><br>
 +
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.
 +
 
 +
 
 +
 
 +
 
 +
'''May'''
 
*Date: Saturday, May 14, 2011  
 
*Date: Saturday, May 14, 2011  
 
*Time: 12:30pm - 3:30pm  
 
*Time: 12:30pm - 3:30pm  
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000  
+
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000  
 
*Topics & Speakers: <br>
 
*Topics & Speakers: <br>
 
<br>Robert Gezelter - <br>
 
<br>Robert Gezelter - <br>
Line 93: Line 92:
  
  
'''March Meeting''' <br> '''Date:''' 3/27/2011 Sunday<br> '''Time:''' 12pm-3pm<br> '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 <br> <br><br> Rajendra Umadas, OWASP Member<br>  
+
'''March''' <br>
 +
'''Date:''' 3/27/2011 Sunday<br> '''Time:''' 12pm-3pm<br> '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 <br> <br><br> Rajendra Umadas, OWASP Member<br>  
  
 
'''Intro to the OWASP Mobile Project'''  
 
'''Intro to the OWASP Mobile Project'''  

Revision as of 10:02, 26 September 2011

OWASP Long Island

Welcome to the Long Island chapter homepage.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

funds to OWASP earmarked for Long Island.


Educational Supporter: AdelphiLogo-150x64.png       

News & Chapter Meeting

Thank You to all those who attended last weeks chapter meeting, and helped make it a success. The next meeting has been planned for November. More details will be posted soon.

  • Date: Thursday, November 17
  • Location: Adelphi University
  • Time: 6:30pm-9:30pm
  • Agenda: TBD
  • Pizza and refreshments will be provided.

Call For Topics & Speakers

If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a LI board member.







If you join our mailing list, then you will receive details of the meeting as soon as they are finalized.
To be a co-sponsor for this or a future meeting consider annual chapter sponsorship
If you can host an upcoming meeting please contact a LI board member.


Calendar

2011 Meeting Schedule
The information on this page is subject to change



Thursday, November 17

  • Time: 6:30pm-9:30pm
  • Location: TBD
  • Topics: TBD



Past Meetings

September

  • Date: Thursday, September 22, 2011
  • Time: 6:30pm - 9:30pm
  • Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000
  • Topics & Speakers:

Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:
Helen will discuss one of the most widespread Web application Vulnerabilities. How can an application be attacked and how to protect yourself.


About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company. Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.


Round Table Discussions Coordinated by Ryan Behan:
Topics - Recent Attack on Infraguard Website. Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? LulzSec, Anonymous, A-Team - Motivations for attacks? How do small-medium size businesses protect themselves from this? Insurance, increased IT budgets?

About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc. He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.



May

  • Date: Saturday, May 14, 2011
  • Time: 12:30pm - 3:30pm
  • Location: Student Center, Hosftra University, Hempstead, NY 11549-1000
  • Topics & Speakers:


Robert Gezelter -
Minimum Necessary Implementation: Reducing Attack Surface increase Security
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS. Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX).
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers. We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs.

About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors. He has spoken widely at conferences throughout the United States and internationally. He has also published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect



March
Date: 3/27/2011 Sunday
Time: 12pm-3pm
Place: 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753


Rajendra Umadas, OWASP Member

Intro to the OWASP Mobile Project

The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.



Dan Guido, OWASP NY/NJ Board Member

The Exploit Intelligence Project

In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year.

In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats.




Ryan Behan, OWASP LI Board Member
Blake Cornell, OWASP Board Member NY/NJ/LI

WebScarab Demo / Web Vulnerabilities Intro WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.

In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.


Free pizza and beverage will be provided. After event networking will be held at a local bar.


Chapter Board Members/Contacts

External Links