Difference between revisions of "Los Angeles/2013 Meetings"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
'''August 2013, Symantec Offices, Culver City'''
+
'''August 28, 2013, Symantec Offices, Culver City'''
  
''' Speaker: TBD'''
+
''' Layer 7 DDos Attacks '''
 +
 
 +
In this talk we will examine different DoS attack techniques used against cloud services. Many attacks discussed in the presentation target the application layer of the service, are highly efficient and asymmetric. In some cases, a single HTTP request of less than 50 bytes is sufficient to knock out a server until reboot. In addition to describing the attacks, we will also investigate the application design issues that lead to vulnerability, and demonstrate coding fixes as well as cloud based defenses that can be used to mitigate the problem.
 +
 
 +
''' Speaker: Cassio Goldschmidt is a former president of the OWASP Los Angeles Chapter '''
  
  

Revision as of 12:25, 30 August 2013

August 28, 2013, Symantec Offices, Culver City

Layer 7 DDos Attacks

In this talk we will examine different DoS attack techniques used against cloud services. Many attacks discussed in the presentation target the application layer of the service, are highly efficient and asymmetric. In some cases, a single HTTP request of less than 50 bytes is sufficient to knock out a server until reboot. In addition to describing the attacks, we will also investigate the application design issues that lead to vulnerability, and demonstrate coding fixes as well as cloud based defenses that can be used to mitigate the problem.

Speaker: Cassio Goldschmidt is a former president of the OWASP Los Angeles Chapter


July 24 2013, Symantec Offices, Culver City

Security of Mobile Ad Hoc and Wireless Sensor Networks

Speaker: Edward Bonver

Edward Bonver, CISSP, CSSLP Senior Principal Software Engineer Product Security Team, Office of the CTO Symantec Corporation


June 26 2013, Symantec Offices, Culver City

I know where you live, I know what you like, I know your email password, and I know your MEID. Why? Because you told me, and you will tell me again in 5 minutes. You are the loudest guy in the room, and your mobile in your pocket is betraying you. I will be talking about the inherit vulnerabilities in mobile devices and how an attacker can exploit them easily. I will show you live demos of exploits and show you how to protect yourself.... if you can.

Speaker: Nicholas Lennox

Name: Nick #UNRESOLVED QUERY ERROR#

Twitter: @MrB0t

IP: 65.196.127.225 located in Arlington, United State // Probably VPN Coordinates: Thirty-eight degrees fifty-seven minutes six point five seconds north, seventy-seven degrees eight minutes forty-four seconds west

Country: United States

City: Langley


May 29 2013, Symantec Offices, Culver City

Cloud Computing – Security and Interoperability Perspectives

Many organizations are evaluating and migrating toward cloud computing solutions. In 2013, some the key challenges pertain to security and interoperability. Open cloud standards can help manage risks, while fostering efficient solution delivery.

Steven Woodward shares updates from numerous international cloud standards related organizations. In Canada, he leads several of the cloud computing initiatives in both the private and public sectors. This includes being one of the founding board members of the Cloud Security Alliance Canadian Chapter.

Steven describes key cloud ecosystems models; highlighting where security considerations fit, along with different perspectives on interoperability. Several real-life scenarios will be used, highlighting cloud concepts, security, interoperability and the impacts these can have on commitments (functionality, costs, time-to-value and quality). Service Agreements and Service Level Agreements will also be addressed to identify where you may find security and interoperability considerations specified in the contracts.

The presentation is designed to be interactive and will include some group activities to generate discussions and identify practical solutions.

Attendees of the presentation will leave with a better understanding of cloud security and interoperability considerations, plus be aware of reference material and models that help address those challenges.

Speaker: Steven Woodward

Steven Woodward is CEO and founder of Cloud Perspectives and is the Canadian Cloud Council Director of Cloud Governance. He was recently announced as the Chief Cloud Officer for “the Politburo”, a new innovative cloud provider based in Canada. He is a leading contributor to the National Institute of Standards for Technology (NIST), TM Forum, Object Management Group Cloud Standards Customer Council and the International Telecommunication Union (ITU) Joint Collaboration Activity cloud computing working groups.

Steven represents the Canadian Advanced Technology Alliance at the Shared Services Canada Architecture Advisory Committee and is helping define the Canadian Federal Government Cloud Computing Strategy. In addition to cloud standards and best practices guides, he authored the “Cloud Measurement” chapter in the 2012 CRC Press published book, “The IFPUG Guide to IT and Software Measurement.” In 2010 he was elected to the International Function Point Users Group (IFPUG) board of directors, where he is responsible for conferences and formed a, IFPUG metrics cloud computing community.

A frequent international instructor, presenter and leader, he continues fostering cloud collaboration in the industry and academia. From Los Angeles, he is travelling to Maui as keynote at the IEEE System of Systems Engineering conference.


April 24 2013, Symantec Offices, Culver City

Tales from the Crypt(o): Lessons About Secrecy from Julius Caesar to Moxie Merlinspike

Speaker#1: Tin Zaw

Tin Zaw is the former president of OWASP Los Angeles Chapter.

Speaker#2: Albert Tu

Honeypots along side IT security operations

Honeypots commonly take a strategic backseat to IT security operations. This has not stopped community based security professionals and enthusiasts to harness the advantages of the honeypot to form world wide networks capturing and sourcing malicious behavior. Communities that have become vendors found opportunity in higher quality IP lists as well providing deep expertise to provide solutions to anti-fraud behavior. The combination is always worth consideration if you are a customer.

Speaker#2: Albert Tu

Albert Tu is an information security professional at Farmers Insurance Exchange. His background is in vulnerability and risk management with a good amount of programming. He has a passion for solving problems of all sorts.


March 20 2013, Joint meeting with ISSA, Monterey Park

Securing Mobile Apps for the Enterprise

Securing Mobile Apps – that’s the big discussion today. The last couple of years enterprises have been attempting to meet this requirement by deploying client-intensive MDMs (Mobile Device Managers). This has left the apps being utilized by partners, suppliers and customers – completely unprotected. How do we meet the challenge of applying security authentication standards to these un-managed devices. This is what will be discussed/demo’d.

Speaker: Garret Grajek

Garret Grajek is a CISSP-certified security engineer with more than 20 years of experience in the information security and authentication space. As Chief Technical Officer and Chief Operating Officer for SecureAuth Corporation, Garret is responsible for the strategic direction of the company’s Identity Enforcement product offerings.


February 20 2013, Symantec Offices, Culver City

Secure Password Storage Practices

(or Why "Hashing + Salting != Secure Passwords")

Many web applications require passwords that are hard for users to remember, cumbersome to type, yet easy for hackers to crack. With affordable, lightning-fast hardware aiding hackers, we have recently seen a number of large organizations in the news for user-password security failures. Join us as we discuss common attacks on password lists/tables as well as some password storage practices that can make any cracking attempts not worth the attackers’ time.

Speaker: iMan Louis

iMan is a Senior Consultant with Cigital Inc., where he conducts security code reviews, ethical hacking, and web application security assessments for some of the largest global corporations. He has also developed courseware for Cigital's Defensive Programming course series and delivered instructor-led training for many years. He brings 12 years of experience in software development and application security. iMan has recently moved from San Francisco to the Greater L.A. area and is looking forward to being an active member of our L.A. OWASP chapter.


January 23 2013, Symantec Offices, Culver City

Top Ten Web Defenses

We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Website developers must learn to code in a secure fashion to have any chance of providing organizations with proper defenses in the current threat-scape. The session will provide specific tips and guidelines to make website code both low risk and less vulnerable.

Speaker: Jim Manico

Jim is the VP of Security Architecture for WhiteHat Security. Jim is also the host of the OWASP Podcast Series, is the committee chair of the OWASP Connections Committee, is the project manager of the OWASP Cheatsheet series, and is a significant contributor to several additional OWASP projects. Jim provides secure coding and developer awareness training for WhiteHat Security using his 8+ years of experience delivering developer-training courses for SANS, Aspect Security and others. He brings 16 years of database-driven Web software development and analysis experience to WhiteHat and OWASP as well. Jim works on the beautiful island of Kauai, Hawaii where he lives with his wife Tracey.