Difference between revisions of "New Jersey"

From OWASP
Jump to: navigation, search
(PRIMARY SPONSOR: [http://aboutus.vzw.com/aboutusoverview.html VERIZON WIRELESS])
Line 5: Line 5:
  
 
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===
 
===PRIMARY SPONSOR: [http://www.amex.com AMERICAN STOCK EXCHANGE]===
Special thanks to: Doug Shin
+
Special thanks to OWASP Board Member: Doug Shin of the AMEX
 
<b>Meeting Address:</b> 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]
 
<b>Meeting Address:</b> 86 Trinity Place, NY NY 10006 ~ [http://tinyurl.com/2c5ohu Directions]
  
<b>Event coSponsors:</b> [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE]
+
<b>Event coSponsors:</b> [http://signacert.com SIGNACERT] ~~ [http://www.ouncelabs.com OUNCE LABS] ~~ [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.fortifysoftware.com FORTIFY SOFTWARE] ~~ [http://www.cenzic.com CENZIC]
  
 
---
 
---
  
TOPIC: <b>Financial Real-Time Threats: Impacting Trading Floor Operations </b>
+
TOPIC: <b>Global Security Week Working Group</b>
 +
What is the current state of Privacy on Web Application Security?
 +
What should we be focusing on?
  
This presentation will aim to illustrate how individual application or
+
Panel Leader: Tom Brennan [http://www.globalsecurityweek.com/html/calendar.html GSW]
network layer threats, if combined correctly, can impact the workload
+
between the “pit” and departments such as settlements, processing and
+
accounting. Stemming from the lowest level of internal threat, systems on,
+
or behind, trading floor operations can be manipulated in ways that might
+
even go unnoticed. Such impact is possible due to the shear complexity of
+
the enterprise applications used, as well as the ways in which they are
+
inter-related.
+
  
TOPIC: <b>JBroFuzz: Effective Fuzzing for Network and Web Applications </b>
+
---
  
JBroFuzz is a stateless network protocol fuzzer that emerged from the
+
TOPIC: <b>Why today's vulnerability assessments are failing and a case for industry standardization</b>
needs of penetration testing. This presentation will aim to illustrate
+
efficient ways of fuzzing in order to minimize the amount of time spent in
+
discovering application and network protocol vulnerabilities.
+
  
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at
+
As organizations mature their information security capabilities they start to extend their requirements to their partners and providers. Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence.  The challenge today is these Vulnerability Assessments are inconsistent in scope & rigor, and reported in a form that makes them incomparable between institutions.  It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc). A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution.  
[http://www.irmplc.com Information Risk Management]
+
  
---
+
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]
 
+
TOPIC: <b>Stock fluctuation from an unrecognized influence. </b>
+
 
+
SPEAKER: Justine Bone-Aitel - [http://www.immunityinc.com Immunity Security]
+
  
 
---
 
---
  
TOPIC: <b>Hackers...BotNets oh My!</b> Obtain a briefing on the current BotNet investigations etc.
+
TOPIC: <b>Hackers...BotNets oh My!</b>
 +
FBI Cybercrimes task force to discuss global status of BotNets.
  
SPEAKER BIO: [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]
+
SPEAKER BIO: Chris Stangel [http://newyork.fbi.gov/nyfohome.htm NYC FBI Cyber Crime Unit]  
  
 
---
 
---
  
TOPIC: <b>Why today's vulnerability assessments are failing and a case for industry standardization</b>  
+
TOPIC: <b>OWASP Project JBroFuzz: Fuzzing for Network and Web Applications </b>
  
As organizations mature their information security capabilities they start to extend their requirements to their partners and providers.  Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence.  The challenge today is these Vulnerability Assessments are inconsistent in scope & rigor, and reported in a form that makes them incomparable between institutions.  It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc).  A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution.  
+
JBroFuzz is a OWASP stateless network protocol fuzzer that emerged from the
 +
needs of penetration testing. This presentation will aim to illustrate
 +
efficient ways of fuzzing in order to minimize the amount of time spent in
 +
discovering application and network protocol vulnerabilities.
  
SPEAKER BIO: Mark Clancy is Senior Vice President at [http://www.citigroup.com Citigroup]
+
SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at
Mr. Clancy has 15 years experience in the information systems and information security industry.  His responsibilities include management of technical content of the company’s information security polices and standards.
+
[http://www.irmplc.com Information Risk Management]
  
Prior to joining Citigroup Mr. Clancy was a consultant working with many fortune 500 companies on Information systems and Information security projects spanning the banking, insurance, pharmaceutical and manufacturing industry sectors. He holds a BS in Electrical Engineering from Drexel University and is a member of IEEE and ISSA and a participant in the FS-ISAC, BITS, FSTC, Financial Fortress Leadership Group, and Global Security Consortium.
+
---
  
--
+
TOPIC: <b>Stock fluctuation from an unrecognized influence. </b>
  
TOPIC:  
+
SPEAKER: Justine Bone - Aitel - [http://www.immunityinc.com Immunity Security]
<b>Blackhat/Defcon</b> - during this debriefing we will discuss many of the hot bleeding edge INFOSEC topics that were covered at the [http://www.blackhat.com Blackhat] & [http://www.defcon.org Defcon] event Aug 1st - Aug 5th.  If you attended the event, look for your picture win a prize... if you missed this annual event, you will want to attend to get a briefing on the hot topics!!!
+
  
SPEAKER BIO: 
+
---
Tom Brennan, President OWASP NY/NJ Metro
+
 
+
--
+
 
+
TOPIC: <b>Global Security Week</b>
+
What is the current state of Privacy on Web Application Security?
+
What should we be focusing on?
+
 
+
Round-Table Panel - [http://www.globalsecurityweek.com/html/calendar.html GSW]
+
 
+
--  
+
  
 
<center><b> Meetings are FREE and open to the PUBLIC - </b>[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] </center>
 
<center><b> Meetings are FREE and open to the PUBLIC - </b>[http://fs7.formsite.com/OWASP/form185804020/index.html RSVP IS REQUESTED] </center>
Line 86: Line 65:
  
 
<b>Event coSponsors:</b> [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]
 
<b>Event coSponsors:</b> [http://www.accessitgroup.com ACCESSIT] ~~ [http://www.cenzic.com CENZIC]
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP] ~~ [http://www.mandiant.com MANDIANT]
+
~~ [http://www.archer-tech.com ARCHER TECHNOLOGIES]  ~~ [http://www.intrepidusgroup.com INTREPIDUS GROUP] ~~ [http://www.mandiant.com MANDIANT]
 
---
 
---
  
Line 112: Line 91:
  
 
--
 
--
 
  
 
TOPIC: <b>Internet Fraud - War Stories</b>
 
TOPIC: <b>Internet Fraud - War Stories</b>
Line 126: Line 104:
 
--  
 
--  
  
TOPIC: IMS = Is Missing Security?  
+
TOPIC: <b>IMS = Is Missing Security? </b>
  
 
SPEAKER: Peter Thermos, Michael McCobb
 
SPEAKER: Peter Thermos, Michael McCobb
Line 150: Line 128:
 
Officers
 
Officers
 
*<b>President:</b> [mailto:jinxpuppy(at)gmail.com Tom Brennan]  
 
*<b>President:</b> [mailto:jinxpuppy(at)gmail.com Tom Brennan]  
*<b>Vice President:</b> [mailto:peter.perfetti(at)abnamro.com Pete Perfetti]  
+
*<b>Vice President:</b> [mailto:pperfetti(at)nba.com Pete Perfetti]  
 
*<b>Secretary:</b> [mailto:santoniewicz(at)net2s.com Steve Antoniewicz]  
 
*<b>Secretary:</b> [mailto:santoniewicz(at)net2s.com Steve Antoniewicz]  
 
*<b>Treasurer:</b> [mailto:tom.ryan(at)providesecurity.com Tom Ryan]  
 
*<b>Treasurer:</b> [mailto:tom.ryan(at)providesecurity.com Tom Ryan]  

Revision as of 07:26, 1 September 2007

Contents

OWASP NY/NJ

Welcome to the NY/NJ chapter homepage.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

SEPTEMBER 6th MEETING

OWASP supports Global Security Week (Sept. 3rd-9th) Click Here More Info.... In local support of this worldwide effort, the next NY/NJ OWASP Chapter meeting will be on September 6th 5:30pm-9:00pm

PRIMARY SPONSOR: AMERICAN STOCK EXCHANGE

Special thanks to OWASP Board Member: Doug Shin of the AMEX Meeting Address: 86 Trinity Place, NY NY 10006 ~ Directions

Event coSponsors: SIGNACERT ~~ OUNCE LABS ~~ ACCESSIT ~~ FORTIFY SOFTWARE ~~ CENZIC

---

TOPIC: Global Security Week Working Group What is the current state of Privacy on Web Application Security? What should we be focusing on?

Panel Leader: Tom Brennan GSW

---

TOPIC: Why today's vulnerability assessments are failing and a case for industry standardization

As organizations mature their information security capabilities they start to extend their requirements to their partners and providers. Providing for the identification and management of information security issues are becoming part of contractual language. Vulnerability Assessment / ethical reports today are used today as one measurable data point to build a confidence in the status of other parties’ web applications and is generally an accepted set in due diligence. The challenge today is these Vulnerability Assessments are inconsistent in scope & rigor, and reported in a form that makes them incomparable between institutions. It is frequently impossible to understand what test design was used (black box/white box), what set of conditions were tested (OWASP top ten only, CVE, items found by common scanning tools, manually exercised conditions, etc) and how issues were rated for severity (CVSS, vendor provided, customer provided, etc). A similar problem existed with information security assessments of operational and physical security at outsourced service providers used by financial institutions and was address by developing an “agreed upon procedures” approach to outline common things needed by institutions so that assessments could be done once by a neutral party and then reused. This presentation, while not offering the complete answer for application security testing, will attempt to outline the components needed for such a solution.

SPEAKER BIO: Mark Clancy is Senior Vice President at Citigroup

---

TOPIC: Hackers...BotNets oh My! FBI Cybercrimes task force to discuss global status of BotNets.

SPEAKER BIO: Chris Stangel NYC FBI Cyber Crime Unit

---

TOPIC: OWASP Project JBroFuzz: Fuzzing for Network and Web Applications

JBroFuzz is a OWASP stateless network protocol fuzzer that emerged from the needs of penetration testing. This presentation will aim to illustrate efficient ways of fuzzing in order to minimize the amount of time spent in discovering application and network protocol vulnerabilities.

SPEAKER: Dr. Yiannis Pavlosoglou is a Security Project Manager at Information Risk Management

---

TOPIC: Stock fluctuation from an unrecognized influence.

SPEAKER: Justine Bone - Aitel - Immunity Security

---

Meetings are FREE and open to the PUBLIC - RSVP IS REQUESTED

OCTOBER 25th MEETING

Full Day, information security summit happening in New Jersey on October 25th. At this all day event, learn from industry experts on topics of information security. There is no charge for this event. October 25th 9:30am-4:30pm

PRIMARY SPONSOR: VERIZON WIRELESS

Special thanks to: Philip Varughese Meeting Address: 295 N Maple Ave, Basking Ridge, NJ 07920 ~ Directions

Event coSponsors: ACCESSIT ~~ CENZIC ~~ ARCHER TECHNOLOGIES ~~ INTREPIDUS GROUP ~~ MANDIANT ---

TOPIC: Keynote

SPEAKER: Renato Delatorre, Verizon Wireless

---

TOPIC: Social Engineering

SPEAKER: Kevin Mitnick

---

TOPIC: ISO 27001 What is it... Why do you care?

SPEAKER BIO: Mahi Dontamsetti

--

TOPIC: VOIP - Can you hear me now?

SPEAKER BIO: Paul Rohmeyer

--

TOPIC: Internet Fraud - War Stories

SPEAKER BIO: Mike Esposito

---

TOPIC: Dig Your Own Hole: 12 Ways to Go Wrong with Java Security

SPEAKER BIO: Richard Bowen

--

TOPIC: IMS = Is Missing Security?

SPEAKER: Peter Thermos, Michael McCobb


--


TOPIC: TBD

SPEAKER BIO: TBD

--

Meetings are FREE and open to the PUBLIC -

To submit educational topic for upcoming meeting please provide submit your powerpoint using the OWASP Template and include a speaker BIO. If you wish to become a sponsor or co-sponsor please click on one of the below email addresses of our active board members.

NY/NJ OWASP Chapter Leaders


The chapter mailing address is:

NY/NJ Metro OWASP 759 Bloomfield Ave #172 West Caldwell, New Jersey 07006
973-202-0122











~