Netherlands Previous Events 2013
Netherlands events held in 2013
- 1 March 13, 2013
- 2 March 7, 2013
- 3 January 31, 2013
March 13, 2013
The Annual OWASP Netherlands Black Hat Edition Chapter meeting
- Every year around Black Hat Europe we try to get Internationally well know speakers to talk at a Chapter Meeting. This year Colin Watson and Georgia Weidman are on the agenda!
- This chaptermeeting will be about web application logging, Access Control Design and the all new OWASP Cornucopia.
- 18:30 - 19:15 Registration & Pizza
- 19:15 - 19:35 "Record It" - Colin Watson
- 19:35 - 19:40 Break
- 19:40 - 20:25 “The smartphone penetration testing framework”- Georgia Weidman
- 20:25 - 20:30 Break
- 20:30 - 21:00 OWASP Cornucopia - Colin Watson
- 21:00 - 21:30 Networking
Do you know security event information should be recorded by an application? Colin Watson will outline which event properties are useful, what should be avoided and how logging can be implemented. In this short presentation, the benefits of good application logging will also be described.
The smartphone penetration testing framework
As smartphones enter the workplace, sharing the network and accessing sensitive data, it is crucial to be able to assess the security posture of these devices in much the same way we perform penetration tests on workstations and servers. However, smartphones have unique attack vectors that are not currently covered by available industry tools. The smartphone penetration testing framework, the result of a DARPA Cyber Fast Track project, aims to provide an open source toolkit that addresses the many facets of assessing the security posture of these devices. We will look at the functionality of the framework including information gathering, exploitation, social engineering, and post exploitation through both a traditional IP network and through the mobile modem, showing how this framework can be leveraged by security teams and penetration testers to gain an understanding of the security posture of the smartphones in an organization. We will also show how to use the framework through a command line console, a graphical user interface, and a smartphone based app. Demonstrations of the framework assessing multiple smartphone platforms will be shown.
Microsoft's Escalation of Privilege (EoP) threat modelling card game has been refreshed into a new version more suitable for common web applications, and aligned with OWASP advice and guides. "OWASP Cornucopia - Ecommerce Web Application Edition" will be presented and used to demonstrate how it can help developers identify security requirements from the OWASP Secure Coding Practices - Quick Reference Guide.
Colin Watson is an application security consultant, based in London. He is project leader for the OWASP Codes of Conduct and OWASP Cornucopia projects, wrote the Application Logging Cheat sheet, contributes to a number of other OWASP projects including AppSensor,and is a member of the OWASP Global Industry Committee.
Georgia Weidman is a penetration tester, security researcher, and trainer. She holds a Master of Science degree in computer science, secure software engineering, and information security as well as holding CISSP, CEH, NIST 4011, and OSCP certifications. Her work in the field of smartphone exploitation has been featured in print and on television internationally. She has presented her research at conferences around the world including Shmoocon, Hacker Halted, Security Zone, and Bsides. Georgia has delivered highly technical security training for conferences, schools, and corporate clients to excellent reviews. Building on her experience, Georgia recently founded Bulb Security LLC (http://www.bulbsecurity.com), a security consulting firm specializing in security assessments/penetration testing, security training, and research/development. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.
March 7, 2013
Incident Respons in a Cyberwar context and Responsible Disclosure
- This chaptermeeting will be about Incident respons in a cyberwar context and responsible disclosure.
- 18:30 - 19:00 Registration
- 19:00 - 19:15 Welcome & Updates
- 19:15 - 20:00 Incident Respons in a Cyberwar context - Dennis Lemckert
- 20:00 - 20:15 Break
- 20:15 - 21:00 Disclosure - Lex Borger & André Koot
Incident Respons in a Cyberwar context
Cyber Warfare is the new buzz in the IT security. However, is War to compare with today's interconnected world? Are breaches in Integrity, Continuity and Exclusivity similar to an attack on a state?
Disclosure, Prevention is better than to cure
In this presentation we explain what the background was behind our request to CPB to perform research of the Diagnostics for U case. We discuss recent incidents in healthcare (Henk Krol, the Groene Land Hospital), and the effects of the announcement for the companies involved. We will also discuss the practice of Responsible Disclosure (the initiatives of the NCSC and others) and the arise of Responsible Disclosure (Leak October and other hacks) and how companies can ensure that information is sufficiently protected against privacy leaks using data identification and classification.
Dennis Lemckert is active in the IT world for almost 20 years. 12 Years thereof, he's operating in or around the IT security world. Some roles that at the time he has completed are: Pentester, Security Auditor, Security Architect, Incident Analyst, Security Analyst and Security Advisor. During that time, Dennis has developed a no-nonsense approach on how to build, deliver and maintain secured environments. However, telling others how to do something well, leaves Dennis little time to play with the latest and cool tools, so he spends most of his time writing documentation, both technical and non-technical, giving awareness training, providing training to both technical staff and management and analyzing and improving incident processes.
Lex Borger is a consultant at Ideas to Interconnect (I-to-I). He has more than 20 years of experience in information security and system security. He was involved in the development of control systems, where he learned to apply security from within. Gradually he broadened his view of information security to the entire field. Most of his experience he has gained in the United States of America. Lex is editor of the journal PvIB "Information"
André Koot's Security Consultant with expertise in Identity Management and Access Control. He is also editor of the PvIB journal "Information", trainer and lecturer at the International Management Forum, member EXIN examination committee, NL Chapter Board member CSA and Advisory Board member IDentity.Next. Previously, André worked for the IRS, and Unive VGZ.