OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.
The long talk is by Ben Lee and Ross Dargan:
The problems with proving identity.
In this talk Ross (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*
(*Talk may not be historically accurate! ;))
The short talks are:
Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.
Take a copy of the game away with you - it is suitable for developers of all sizes.
Michael Haselhurst - Automated Security Testing Using The ZAP API
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.
Mike Goodwin - Real world defence in depth (part 1)
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.
The long talk is by Ben Lee (plus possibly a 2nd co-speaker). The title of Ben's talk is TBC. The short talks are:
- Colin Watson - Think about the Top 10 Controls, not the Top 10 Risk
- Michael Haselhurst - Automated Security Testing Using The ZAP API
- Mike Goodwin - Real world defence in depth (part 1)
The first meeting of 2016 will be on January 26th from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).
- John Beddard on Securing Real-Time Networks (short talk) Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf
- Ian Oxley on Content Security Policy (short talk) Media: CSP_Newcastle_Chapter_Sept_2015.pdf
- Mike Goodwin on Threat Dragon - a new threat modelling tool project from OWASP (short talk) Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx
- Neil Dixley on 'OWASP Top 10 Mobile Risks' (long talk) Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.
- Andrew Waite: Honeypots; from research to the Enterprise.
- George Chlapoutakis: Security in the World of Containerisation.
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.
- Robin Fewster: An introduction to basic application penetration testing.
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. Media: An_introduction_to_penetration_testing.pptx
- Neil Dixley: The Elevation of Privilege Threat Modelling Tool.
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. Media: Threat_Modeling_Presentation.pptx
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.
- Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering. An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx
- Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?. Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of "what's the worst that can happen...", Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. Media: OWASP_Compliance_for_Devs.pptx
The chapter leaders are:
Once the group is up and running we will be looking for more leaders.
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas. Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:
- Platinum sponsor (£1200)
- Gold sponsor (£600)
- Silver sponsor (£300)
Any other donation is also gratefully received.
Other related organisations in the Newcastle area:
- (ISC)2 North East Chapter - for information, contact the chapter secretary, Robin Fewster, the chapter president Ken Walls, the chapter membership officer Scott Wakeling or the chapter treasurer Gordon Leishman.
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.
And feel free to use the Newcastle mailing list to publicise related events (this list is moderated).