Difference between revisions of "Netherlands Previous Events 2013"

From OWASP
Jump to: navigation, search
(Added Meeting details March 7th 2013)
 
m (nevigation added)
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[Netherlands]] events held in 2013
+
;[[Netherlands | OWASP Netherland Wiki]]  
  
= March 13, 2013 =
+
;[[Netherlands May 14, 2013]]
= March 7, 2013 =
+
*[[Netherlands_May_14,_2013#Securing_Password_Storage_-_Increasing_Resistance_to_Brute_Force_Attacks|Securing Password Storage - Increasing Resistance to Brute Force Attacks - Tiago Teles]]
'''Incident Respons in a Cyberwar context and Responsible Disclosure'''
+
:[https://github.com/jsteven/psm/tree/master/presentations The presentation (with and without notes) can be found here]
:This chaptermeeting will be about Incident respons in a cyberwar context and responsible disclosure.
+
*[[Netherlands_May_14,_2013#Neutralizing_Peer-to-Peer_Botnets|Neutralizing Peer-to-Peer Botnets - Dennis Andriesse]] - ([[Media:Owaspnl_zeus-owasp-2013‎.pdf | Download the presentation as PDF]])
==Programme:==
+
;[[Netherlands April 10, 2013]]
:18:30 - 19:00  Registration
+
*[[Netherlands_April_10,_2013#Access_Control_Design_Best_Practices|Access Control Design Best Practices - Jim Manico]] - ([[Media:Owaspnl-jimmanico-toptendefensesv8.pdf‎ | Download the presentation as PDF]])
:19:00 - 19:15  Welcome & Updates
+
*[[Netherlands_April_10,_2013#RESTful_web_services.2C_the_web_security_blind_spot|RESTful web services, the web security blind spot - Ofer Shezaf]] - ([[Media:Owaspnl-oferschezaf-securitytestingforrestapplicationsv6april2013.pdf | Download the presentation as PDF]])
:19:15 - 20:00  Incident Respons in a Cyberwar context - Dennis Lemckert
+
;[[Netherlands March 13, 2013]]
:20:00 - 20:15 Break
+
*[[Netherlands_March_13,_2013#Record_It.21|Record It - Colin Watson]] - ([[Media:Owaspnl-colinwatson-recordit.pdf | Download the presentation as PDF]])
:20:15 - 21:00  Disclosure - Lex Borger & André Koot
+
*[[Netherlands_March_13,_2013#The_smartphone_penetration_testing_framework|The smartphone penetration testing framework - Georgia Weidman]] - ([[Media:The_smartphone_penetration_testing_framework-Georgia_Weidman.pdf | Download the presentation as PDF]])
==Presentations:==
+
*[[Netherlands_March_13,_2013#OWASP_Cornucopia|OWASP Cornucopia - Colin Watson]] - ([[Media:Owaspnl-colinwatson-cornucopia.pdf | Download the presentation as PDF]])
===Incident Respons in a Cyberwar context===
+
;[[Netherlands March 7, 2013]]
Cyber Warfare is the new buzz in the IT security. However, is War to compare with today's interconnected world? Are breaches in Integrity, Continuity and Exclusivity similar to an attack on a state?
+
*[[Netherlands March 7, 2013#Incident_Respons_in_a_Cyberwar_context|Incident Respons in a Cyberwar context - Dennis Lemckert ]]
===Disclosure, Prevention is better than to cure===
+
*[[Netherlands_March_7,_2013#Disclosure.2C_Prevention_is_better_than_to_cure|Disclosure - Lex Borger & André Koot ]]
In this presentation we explain what the background was behind our request to CPB to perform research of the Diagnostics for U case. We discuss recent incidents in healthcare (Henk Krol, the Groene Land Hospital), and the effects of the announcement for the companies involved. We will also discuss the practice of Responsible Disclosure (the initiatives of the NCSC and others) and the arise of Responsible Disclosure (Leak October and other hacks) and how companies can ensure that information is sufficiently protected against privacy leaks using data identification and classification.
+
;[[Netherlands January 31, 2013]]:
==Speakers==
+
*[[Netherlands_January_31,_2013#The_Truth_about_the_e.dentifier2|The Truth about the e.dentifier2 - Erik Poll]]
===Dennis Lemckert===
+
*[[Netherlands_January_31,_2013#OWASP_Update|OWASP Update - Martin Knobloch]]
Dennis Lemckert is active in the IT world for almost 20 years. 12 Years thereof, he's operating in or around the IT security world. Some roles that at the time he has completed are: Pentester, Security Auditor, Security Architect, Incident Analyst, Security Analyst and Security
+
Advisor. During that time, Dennis has developed a no-nonsense approach on how to build, deliver and maintain secured environments.
+
However, telling others how to do something well, leaves Dennis little time to play with the latest and cool tools, so he spends most of his time writing documentation, both technical and non-technical, giving awareness training, providing training to both technical staff and management and analyzing and improving incident processes.
+
===Lex Borger===
+
Lex Borger is a consultant at Ideas to Interconnect (I-to-I). He has more than 20 years of experience in information security and system security. He was involved in the development of control systems, where he learned to apply security from within.
+
Gradually he broadened his view of information security to the entire field. Most of his experience he has gained in the United States of America. Lex is editor of the journal PvIB "Information"
+
===André Koot===
+
André Koot's Security Consultant with expertise in Identity Management and Access Control.
+
He is also editor of the PvIB journal "Information", trainer and lecturer at the International Management Forum, member EXIN examination committee, NL Chapter Board member CSA and Advisory Board member IDentity.Next. Previously, André worked for the IRS, and Unive VGZ.
+
 
+
= January 31, 2013 =
+

Revision as of 07:37, 15 May 2013

OWASP Netherland Wiki
Netherlands May 14, 2013
The presentation (with and without notes) can be found here
Netherlands April 10, 2013
Netherlands March 13, 2013
Netherlands March 7, 2013
Netherlands January 31, 2013