Difference between revisions of "OWASP IRELAND 2010"

From OWASP
Jump to: navigation, search
(Sponsors)
 
(38 intermediate revisions by 4 users not shown)
Line 1: Line 1:
[[Image:Dublin2010.gif]] 
+
__NOTOC__
  
<br>
 
  
Welcome to the Irish OWASP Application Security Conference!<br>
 
  
Its Ireland's turn again&nbsp;on '''September 17, 2010'''
 
  
<br>
+
[[Image:Dublin2010.gif]]
  
'''September 17th 2010''': OWASP will hold its second Irish Application Security conference in&nbsp;Dublin University, Trinity College, Dublin, Ireland.
+
<br>
  
The conference consists of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity.
+
Welcome to the Irish OWASP Application Security Conference!<br>
  
'''[http://www.owasp.org/index.php/OWASP_IRELAND_2010#Training Training]: (16th September 2010)'''<br>'''''Secure Application Development: Writing secure code (and testing it)''''' training is to be delivered on the 16 September, following the very successful model delivered in 2009 (see more details below)
+
On&nbsp;'''September 17th, 2010''' OWASP held its second Irish Application Security conference in&nbsp;Dublin University, Trinity College, Dublin, Ireland.
  
<br>
+
==== About  ====
  
For more details please contact: Eoin.Keary 'at' owasp.org
+
The conference consisted of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity. <br>
  
== Conference Location ==
+
Finally six months of work by the OWASP Ireland chapter board paid off:<br>
 +
 
 +
Many thanks :<br>
 +
- To every one who attended, helped out, presented, ran about.<br>
 +
- To Samy Kamkar who came over to enlighten us all about how he'll meet your girlfriend.......<br>
 +
- To John Viega, Fred Piper and Damian Gordon for their keynotes, they were great and provoked much discussion.<br>
 +
- To all our local and international speakers who took time (and expense) to come over and present...<br>
 +
- Also thanks to our sponsors for all assistance.<br>
 +
 
 +
Colin Watson who attended covered the event very nicely here:<br>
 +
http://www.clerkendweller.com/2010/9/17/OWASP-AppSec-Ireland-2010--Part-2?utm_source=twitterfeed&utm_medium=twitter<br>
 +
 
 +
Next stop:<br>
 +
 
 +
OWASP Europe 2011<br>
 +
June/July 2011<br>
 +
Dublin Ireland<br>
 +
 
 +
Photos and slides of OWASP Ireland 2010 event will be available shortly... stay tuned!
 +
 
 +
==== Venue ====
  
 
[[Image:AppSecIreland09 Dublin.JPG|www.tcd.ie]]  
 
[[Image:AppSecIreland09 Dublin.JPG|www.tcd.ie]]  
  
<br>
+
Trinity College, Dublin <br>[http://www.tcd.ie/Maps/map.php?q=hamilton+building Map of hamilton Building Location]
  
== Event Sponsorship  ==
+
[http://www.tcd.ie/Maps/map.php?q=dining+hall Dining Hall location]
 +
 
 +
==== Sponsorship  ====
  
 
OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented. <br>Sponsorship details are available here:&nbsp; Please review or sponsorship proposal:&nbsp;[http://www.owasp.org/images/c/c8/OWASP_sponsorship_Master.pdf Click_here]  
 
OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented. <br>Sponsorship details are available here:&nbsp; Please review or sponsorship proposal:&nbsp;[http://www.owasp.org/images/c/c8/OWASP_sponsorship_Master.pdf Click_here]  
 
<center>
 
<center>
&nbsp;
+
&nbsp;  
</center>
+
</center>  
 
=== Sponsors  ===
 
=== Sponsors  ===
  
 
'''Silver Sponsors'''  
 
'''Silver Sponsors'''  
 
<center>
 
<center>
[[Image:Cenzic small 2.GIF]]
+
[[Image:Cenzic small 2.GIF]]  
 
</center><center>
 
</center><center>
'''CENZIC''' - Cenzic provides software and SaaS solutions for dynamic, black box<br>testing of Web applications to protect Websites against hacker attacks.<br>Built from the ground up on a completely different technology backbone<br>than its competitors, Cenzic goes beyond signature-based tools to find<br>more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com <br>
+
'''CENZIC''' - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com <br>  
  
<br>
+
<br>  
 
</center><center>[[Image:Veracode logo 2color small.JPG]]</center><center>
 
</center><center>[[Image:Veracode logo 2color small.JPG]]</center><center>
 
'''Veracode''' is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/  
 
'''Veracode''' is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/  
</center>
+
</center>  
<br><br>
+
<br><br>  
<center>[[Image:FORTIFY_LOGO_MED.jpg]]</center>
+
<center>[[Image:FORTIFY LOGO MED.jpg]]</center><center>
<center>
+
'''Fortify® Software''' is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com  
Fortify® Software is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com
+
</center>  
</center>
+
<br><br>
 
+
<center>[[Image:IBM logo blue high res - small.jpg]]</center><center>
 +
IBM Rational® offers Web site security, Web site compliance, and application security solutions for the most comprehensive approach to assessing vulnerabilities in networked applications and critical Web sites. IBM Rational AppScan® and IBM Rational Policy Tester®, Web site security, compliance, and application security solutions, can help you avoid these risks. Our solutions automate application and content analysis. They help you identify vulnerabilities, assess compliance requirements, and improve the accuracy and reliability of online systems.
 +
IBM home page: www.ibm.com/ie</center>
 
=== Supported by  ===
 
=== Supported by  ===
 
<center>
 
<center>
[[Image:Irisss small.jpg]] [[Image:IISF.jpg]] [[Image:Iia-logo-small.jpg]][[Image:DG horiz col.gif]]
+
[[Image:Irisss small.jpg]] [[Image:IISF.jpg]] [[Image:Iia-logo-small.jpg]][[Image:DG horiz col.gif]]  
</center>
+
</center>  
== Agenda and Presentations - September 17 ==
+
 
 +
 
 +
==== Agenda  ====
  
 
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.  
 
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.  
Line 70: Line 93:
 
| style="background: #7b8abd; width: 10%" | 09:00 - 09:10  
 
| style="background: #7b8abd; width: 10%" | 09:00 - 09:10  
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" | Welcome to OWASP Ireland 2010 Conference  
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" | Welcome to OWASP Ireland 2010 Conference  
'''''[[User:EoinKeary|Eoin Keary]], [http://ie.linkedin.com/in/fcerullo Fabio Cerullo] &amp; Rahim Jina'''&nbsp;<br>'''OWASP Ireland Board''''' <br>'''Location: Joly Theatre'''
+
'''''[[User:EoinKeary|Eoin Keary]], [http://ie.linkedin.com/in/fcerullo Fabio Cerullo] &amp; Rahim Jina'''&nbsp;<br>'''OWASP Ireland Board''''' <br>'''Location: Joly Theatre'''  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 09:15 - 10:15
+
| style="background: #7b8abd; width: 10%" | 09:15 - 10:00
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" | '''Keynote: "Application Security in the Real World"''' - Considerations for AppSec in non-security companies.  
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" | '''Keynote: "Application Security in the Real World"''' - Considerations for AppSec in non-security companies.  
 
'''''[[John Viega|John Viega&nbsp;]]&nbsp;'''''Executive Vice President, Perimeter E-Security  
 
'''''[[John Viega|John Viega&nbsp;]]&nbsp;'''''Executive Vice President, Perimeter E-Security  
  
'''Location: Joly Theatre'''
+
'''Location: Joly Theatre'''  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 10:20 - 10:40
+
| style="background: #7b8abd; width: 10%" | 10:10 - 10:30
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" |  
 
| style="background: #f2f2f2; width: 80%" align="center" colspan="2" |  
 
OWASP "State of the Nation"  
 
OWASP "State of the Nation"  
  
[[User:EoinKeary|'''Eoin Keary''']]&amp;&nbsp;[[User:Dinis Cruz|'''Dinis Cruz''']]  
+
[[User:EoinKeary|'''Eoin Keary''']]&amp;&nbsp;[[User:Dinis.cruz|'''Dinis Cruz''']]  
  
<sub>''OWASP Global board members''</sub>
+
<sub>''OWASP Global board members''</sub>  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 10:45 - 11:10  
+
| style="background: #7b8abd; width: 10%" | 10:30 - 10:50
 
| style="background: #c2c2c2; width: 80%" align="left" colspan="2" | Break - Expo
 
| style="background: #c2c2c2; width: 80%" align="left" colspan="2" | Break - Expo
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 11:10 -&nbsp;11:45
+
| style="background: #7b8abd; width: 10%" | 11:00 -&nbsp;11:35
 
| style="background: #bc857a; width: 40%" align="left" |  
 
| style="background: #bc857a; width: 40%" align="left" |  
"Testing the Enterprise E-mail Security - from Software to Cloud-based Services"<br>[[User:Dr. Marian Ventuneac|'''Dr. Marian Ventuneac''']]
+
"Testing the Enterprise E-mail Security - from Software to Cloud-based Services"<br>[[User:Dr. Marian Ventuneac|'''Dr. Marian Ventuneac''']]  
  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
| style="background: #bca57a; width: 40%" align="left" |  
"Setting up a Security Development Lifecycle for the first time"  
+
"Counter Intelligence as Defense: Integrating predictive and proactive attack knowledge as a wall of defense"  
  
<br>[[User:SebastienGioria|'''Sébastien Gioria''']]
+
<br>[[User:FredDonovan|'''Fred Donovan''']]  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 11:50 - 12:30
+
| style="background: #7b8abd; width: 10%" | 11:40 - 12:15
 
| style="background: #bc857a; width: 40%" align="left" |  
 
| style="background: #bc857a; width: 40%" align="left" |  
"The Evolution of Security Testing: Testing the Resiliency of Security"<br>
+
"The Evolution of Security Testing: Testing the Resiliency of Security"<br>  
  
[[David Stubley|'''David Stubley''']] (GIAC)
+
[[David Stubley|'''David Stubley''']] (GIAC)  
  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
| style="background: #bca57a; width: 40%" align="left" |  
 +
[[Path to a Secure Application|"Path to a Secure Application"]] <br>[[User:RyanBerg|'''Ryan Berg''']] IBM
 +
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 12:40 - 13:10
+
| style="background: #7b8abd; width: 10%" | 12:20 - 13:00
 
| style="background: #bc857a; width: 40%" align="left" |  
 
| style="background: #bc857a; width: 40%" align="left" |  
 
"Smart Phones with Dumb Apps"  
 
"Smart Phones with Dumb Apps"  
  
[[Dan Cornell|'''Dan Cornell''']]&nbsp; Principal of [http://www.denimgroup.com Denim Group], Ltd.
+
[[Dan Cornell|'''Dan Cornell''']]&nbsp; Principal of [http://www.denimgroup.com Denim Group], Ltd.  
  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
"Technology and Business Risk Management: How Application Security Fits In!  
 
"Technology and Business Risk Management: How Application Security Fits In!  
  
[[User:Peter Perfetti|'''Peter Perfetti''']]
+
[[User:Peter Perfetti|'''Peter Perfetti''']]  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 13:10 - 14:10
+
| style="background: #7b8abd; width: 10%" | 13:00 - 13:45
 
| style="background: #c2c2c2; width: 80%" align="left" colspan="2" | Lunch - [http://www.tcd.ie/Maps/map.php?q=dining+hall TCD Dining Hall], buffet Lunch
 
| style="background: #c2c2c2; width: 80%" align="left" colspan="2" | Lunch - [http://www.tcd.ie/Maps/map.php?q=dining+hall TCD Dining Hall], buffet Lunch
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 1410 - 15:00
+
| style="background: #7b8abd; width: 10%" | 13:50 - 14:30
 
| style="background: #c2c2c2; width: 80%" align="center" colspan="2" | '''Keynote: "The changing face of cryptography"'''  
 
| style="background: #c2c2c2; width: 80%" align="center" colspan="2" | '''Keynote: "The changing face of cryptography"'''  
'''''[[User:Professor Fred Piper|Professor Fred Piper]]'''''<i>, BSc, PhD (London), ARCS, DIC, CEng, CMath, FIEE, FIMA, BCS, CISSP, CISM.</i> <br>
+
'''''[[User:Professor Fred Piper|Professor Fred Piper]]'''''<i>, BSc, PhD (London), ARCS, DIC, CEng, CMath, FIEE, FIMA, BCS, CISSP, CISM.</i> <br>  
  
'''Location: Joly Theatre'''
+
'''Location: Joly Theatre'''  
  
 
|-
 
|-
| style="background: #7b8abd; width: 10%" | 15:10 - 15:50  
+
| style="background: #7b8abd; width: 10%" | 14:35 - 15:10  
 +
| style="background: #bc857a; width: 40%" align="left" |
 +
"Application Security Scoreboard in the Sky"
 +
 
 +
[[Tyler shields|'''Tyler Shields''']](Veracode)
 +
 
 +
| style="background: #bca57a; width: 40%" align="left" |
 +
"Using the OWASP O2 Platform to consume OWASP projects"
 +
 
 +
[http://uk.linkedin.com/pub/dinis-cruz/5/742/233 '''Dinis Cruz''']
 +
 
 +
|-
 +
| style="background: #7b8abd; width: 10%" | 15:15 - 15:50  
 
| style="background: #bc857a; width: 40%" align="left" |  
 
| style="background: #bc857a; width: 40%" align="left" |  
 
"Microsoft's Security Development Lifecycle for Agile Development"  
 
"Microsoft's Security Development Lifecycle for Agile Development"  
  
[[Nick Coblentz|'''Nick Coblentz''']]&nbsp;AT&amp;T Consulting
+
[[Nick Coblentz|'''Nick Coblentz''']]&nbsp;AT&amp;T Consulting  
  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
| style="background: #bca57a; width: 40%" align="left" |  
[[The Real appsec pentest|"The "real" application security pentest."]]<br>
+
[[The Real appsec pentest|"The "Real" Application Security Pentest."]]<br>  
  
[[Rory Alsop|'''Rory Alsop''']]&amp; [[Rory McCune|'''Rory McCune''']]
+
[[Rory Alsop|'''Rory Alsop''']]&amp; [[Rory McCune|'''Rory McCune''']]  
  
 
|-
 
|-
Line 148: Line 185:
 
"How to Defend Fragile Web Applications"  
 
"How to Defend Fragile Web Applications"  
  
[[Vinay Bansal, Martin Nystrom|'''Vinay Bansal, Martin Nystrom''']] Cisco systems
+
[[Vinay Bansal, Martin Nystrom|'''Vinay Bansal, Martin Nystrom''']] Cisco systems  
  
 
| style="background: #bca57a; width: 40%" align="left" |  
 
| style="background: #bca57a; width: 40%" align="left" |  
<br>
+
[[Scareware Traversing the World via Ireland|"Scareware Traversing the World via Ireland"]]<br>  
 +
 
 +
[[User:Mark Hillick|'''Mark Hillick''']]
  
 
|-
 
|-
Line 160: Line 199:
 
'''''[[User:Damian Gordon|Damian Gordon]]'''''<i>&nbsp;Phd, School of Computing&nbsp;Dublin Institute of Technology.</i>  
 
'''''[[User:Damian Gordon|Damian Gordon]]'''''<i>&nbsp;Phd, School of Computing&nbsp;Dublin Institute of Technology.</i>  
  
'''''Location: Joly Theatre'''''
+
'''''Location: Joly Theatre'''''  
  
 
|-
 
|-
Line 170: Line 209:
 
|}
 
|}
  
= Training  =
 
  
We intend to hold some application security training on the 16/09/2010 the day prior to the event.<br>This can be booked when booking a ticket to the event.<br>'''Fee: €495'''
 
  
== '''Secure Application Development: Writing secure code (and testing it)'''<br> ==
+
==== Training  ====
 +
 
 +
We intend to hold some application security training on the 16/09/2010 the day prior to the event.<br>This can be booked when booking a ticket to the event.<br>
 +
 
 +
== '''Secure Application Development: Writing secure code (and testing it)'''<br> ==
  
 
'''Trainers''':  
 
'''Trainers''':  
Line 182: Line 223:
 
'''Rahim Jina''' Senior Consultant, Ernst &amp;&nbsp;Young, OWASP Ireland chapter board.  
 
'''Rahim Jina''' Senior Consultant, Ernst &amp;&nbsp;Young, OWASP Ireland chapter board.  
  
<br>
+
<br>  
  
 
'''Abstract'''<br>Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.  
 
'''Abstract'''<br>Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.  
Line 191: Line 232:
  
 
*Unvalidated Input  
 
*Unvalidated Input  
*Injection Flaws<br>
+
*Injection Flaws  
 
*Cross-Site Scriping  
 
*Cross-Site Scriping  
 
*CSRF  
 
*CSRF  
Line 197: Line 238:
 
*Access control &amp; Authorisation  
 
*Access control &amp; Authorisation  
 
*Broken Caching  
 
*Broken Caching  
*Error Handling  
+
*Error Handling &amp;Resource Management
 
*Cryptography  
 
*Cryptography  
*Resource Management
+
*Rich Internet Applications  
*Rich Internet Applications &amp;&nbsp;Webservices
+
 
*The Secure SDLC
 
*The Secure SDLC
  
Line 217: Line 257:
 
'''Prerequisite'''  
 
'''Prerequisite'''  
  
Basic knowledge of a web programming language like Java or .NET recommended but not required. <br>
+
Basic knowledge of a web programming language like Java or .NET recommended but not required. <br>  
  
 
Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.  
 
Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.  
Line 225: Line 265:
 
Full day - 8 Hours<br>
 
Full day - 8 Hours<br>
  
= Venue =
+
==== Registration ====
  
Trinity College, Dublin <br>[http://www.tcd.ie/Maps/map.php?q=hamilton+building Map of hamilton Building Location]
+
Registration is now '''closed'''
  
[http://www.tcd.ie/Maps/map.php?q=dining+hall Dining Hall location]
+
==== Travel  ====
 +
=== By Air  ===
  
= Transportation  =
+
<br>Fly to Dublin Airport: http://www.dublinairport.com/ <br>A taxi or bus can take you into Dublin city. (€30 - Taxi) (€10 - Bus)<br>
  
=== By Air  ===
+
==== Hotels ====
 +
'''Recommended Hotel:'''<br>
 +
 
 +
A hotel has been block booked in the middle of the city for the OWASP Event in Dublin in September:<br>http://www.owasp.org/index.php?title=OWASP_IRELAND_2010<br> <br>The rooms have been booked for the 16th and 17th September and shall be held for OWASP until September 3rd.<br> <br>Hotel in question is The Morgan Hotel:<br>http://www.themorgan.com/<br> <br>Rate - 150 euro per room per night, bed and breakfast <br> <br>Please quote "Trinity College" and contact hotel reservations 01 6437061 or email reservations@themorgan.com <br>
  
<br>Fly to Dublin Airport: http://www.dublinairport.com/ <br>A taxi or bus can take you into Dublin city. (€30 - Taxi) (€10 - Bus)<br>
+
<br>  
  
=== Public Transport  ===
+
<br>
  
= Accommodation  =
+
'''Trinity College''':
  
 
Please see here if you wish to stay within the grounds of Trinity College:<br>http://www.owasp.org/images/2/20/TCD_Tariff_2009.pdf  
 
Please see here if you wish to stay within the grounds of Trinity College:<br>http://www.owasp.org/images/2/20/TCD_Tariff_2009.pdf  
Line 245: Line 289:
 
'''Hotels Surrounding Trinity College:'''  
 
'''Hotels Surrounding Trinity College:'''  
  
http://maps.google.com/maps?near=Dame+Street,+College+Green,+Dublin+2,+Ireland+(Trinity+College+Campus)&amp;geocode=Cfm6cyTmqt_IFev1LQMdLZCg_yFJu3aKhBD7GA&amp;q=hotels&amp;f=l&amp;dq=Trinity+College+loc:+Dublin+Ireland&amp;sll=53.341482,-6.258302&amp;sspn=0.012043,0.037637&amp;ie=UTF8&amp;ei=U6TMSZSzKpSw2QLG_-CUCA&amp;attrid=1036f063d3d0dafc_&amp;ll=53.343711,-6.254568&amp;spn=0.012042,0.037637&amp;z=15  
+
[http://maps.google.com/maps?near=Dame+Street,+College+Green,+Dublin+2,+Ireland+(Trinity+College+Campus)&geocode=Cfm6cyTmqt_IFev1LQMdLZCg_yFJu3aKhBD7GA&q=hotels&f=l&dq=Trinity+College+loc:+Dublin+Ireland&sll=53.341482,-6.258302&sspn=0.012043,0.037637&ie=UTF8&ei=U6TMSZSzKpSw2QLG_-CUCA&attrid=1036f063d3d0dafc_&ll=53.343711,-6.254568&spn=0.012042,0.037637&z=15 http://maps.google.com/maps?near=Dame+Street,+College+Green,+Dublin+2,+Ireland+(Trinity+College+Campus)&amp;geocode=Cfm6cyTmqt_IFev1LQMdLZCg_yFJu3aKhBD7GA&amp;q=hotels&amp;f=l&amp;dq=Trinity+College+loc:+Dublin+Ireland&amp;sll=53.341482,-6.258302&amp;sspn=0.012043,0.037637&amp;ie=UTF8&amp;ei=U6TMSZSzKpSw2QLG_-CUCA&amp;attrid=1036f063d3d0dafc_&amp;ll=53.343711,-6.254568&amp;spn=0.012042,0.037637&amp;z=15]
  
= Registration  =
 
  
'''The fee for this conference is&nbsp;:<br>'''''Standard''': €150 Euro <br>'''OWASP Members''': €100 Euro
+
==== Raffle  ====
 +
<br> '''Special RAFFLE:'''<br> The draw for the Visual Studio 2008 Training raffle took place 3rd September 2010 at the New Horizons Ireland offices in central Dublin.
  
'''Training: '''€495<br><br>'''Membership of OWASP is not required to attend the event.'''<br>
+
Alan Deery, Sales Manager at New Horizons Ireland, pulled the winning ticket (http://www.owasp.org/index.php/File:P1050389.JPG)
  
'''Note''': To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.  
+
And the winner is... Chris Adams, please contact Alan Deery or Fabio Cerullo to provide you further details on how to claim your prize.  
  
'''Cvent Registration Link: [http://guest.cvent.com/i.aspx?4W%2cM3%2c679c382d-35c2-4815-a399-c2c3a95ebfd7 Click-Here]'''
+
Congratulations to the winner and a big thank you to everyone who took part.  
  
= Conference Committee  =
+
==== Photos  ====
 +
 
 +
To be available soon.
 +
 
 +
 
 +
==== Conference Committee  ====
  
 
'''2010 Ireland Planning Committee Chair''':  
 
'''2010 Ireland Planning Committee Chair''':  
  
Eoin Keary -&nbsp;eoin.keary 'at' owasp.org  
+
Eoin Keary -&nbsp;eoin.keary 'at' owasp.org<br>  
 
+
<br>
+
  
 
Fabio Cerullo&nbsp; - fcerullo 'at' owasp.org  
 
Fabio Cerullo&nbsp; - fcerullo 'at' owasp.org  
Line 269: Line 316:
 
Rahim Jina - rahim.jina 'at' owasp.org  
 
Rahim Jina - rahim.jina 'at' owasp.org  
  
= Call for Papers  =
 
 
The Conference will consist of two tracks covering both technical and risk management topics.
 
 
'''We are seeking presentations on any of the following topics:'''
 
 
*Web Services and Application Security
 
*Common Application related Threats and Risks
 
*Business Risks with Application Security
 
*Vulnerability Research in Application Security
 
*Web Application Penetration Testing
 
*OWASP Tools and Projects
 
*Secure Coding/Development Practices
 
*Technology specific presentations on security such as AJAX, XML, etc.
 
*Anything else relating to OWASP and Application Security.
 
 
The call for papers/presentations is out. The official closing date for receiving a synopsis of the presentation is June 10th, 2010. Announcements on selected candidates will be provided the first week of July 2010. Complete presentations will need to be submitted by the 2nd of August 2010.
 
 
All presenters will receive free invitation to the conference, food and refreshments.
 
 
'''For some speakers, OWASP will cover some of the travel costs associated with coming to the conference.'''
 
 
<br>
 
  
'''Please submit your presentation topics and an abstract of up to 500 words to Eoin Keary''' &lt;mailto: Eoin.keary@owasp.org&gt;
+
<headertabs/>

Latest revision as of 06:19, 25 September 2010



Dublin2010.gif


Welcome to the Irish OWASP Application Security Conference!

On September 17th, 2010 OWASP held its second Irish Application Security conference in Dublin University, Trinity College, Dublin, Ireland.

About

The conference consisted of an intensive day of talks/presentations and discussion with 2 different tracks focusing on the causes and trends in web application insecurity.

Finally six months of work by the OWASP Ireland chapter board paid off:

Many thanks :
- To every one who attended, helped out, presented, ran about.
- To Samy Kamkar who came over to enlighten us all about how he'll meet your girlfriend.......
- To John Viega, Fred Piper and Damian Gordon for their keynotes, they were great and provoked much discussion.
- To all our local and international speakers who took time (and expense) to come over and present...
- Also thanks to our sponsors for all assistance.

Colin Watson who attended covered the event very nicely here:
http://www.clerkendweller.com/2010/9/17/OWASP-AppSec-Ireland-2010--Part-2?utm_source=twitterfeed&utm_medium=twitter

Next stop:

OWASP Europe 2011
June/July 2011
Dublin Ireland

Photos and slides of OWASP Ireland 2010 event will be available shortly... stay tuned!

Venue

www.tcd.ie

Trinity College, Dublin
Map of hamilton Building Location

Dining Hall location

Sponsorship

OWASP is providing sponsors exclusive access to its audience in Dublin, Ireland through a limited number of Expo floor slots, providing a focused setting for potential customers. The conference is expected to draw 150 - 200 technologists who will be looking for ways to spend their remaining 2010 budget and planning for 2010/11. Financial Services, Media, Pharmaceuticals, Government, Healthcare, Technology, and many other verticals will be represented.
Sponsorship details are available here:  Please review or sponsorship proposal: Click_here

 

Sponsors

Silver Sponsors

Cenzic small 2.GIF

CENZIC - Cenzic provides software and SaaS solutions for dynamic, black box testing of Web applications to protect Websites against hacker attacks.Built from the ground up on a completely different technology backbone than its competitors, Cenzic goes beyond signature-based tools to find more "real" vulnerabilities. To request a free demo please visit http://www.cenzic.com


Veracode logo 2color small.JPG

Veracode is the world’s leader in cloud-based application risk management. With patented binary code analysis, dynamic Web assessments, and partner or Veracode-delivered manual penetration testing, combined with developer e-learning and access to open source security ratings, Veracode SecurityReview® allows customers to independently verify application security in both internally developed applications and third-party software without requiring source code or expensive tools. Veracode provides the most simple, complete and accurate way to implement security best practices, reduce operational cost and comply with internal security policies or external standards such as OWASP Top 10, CWE/SANS Top 25 and PCI. Veracode works with global organizations across multiple vertical industries including Barclays PLC, California Public Employees’ Retirement System (CalPERS), Computershare, and the Federal Aviation Administration (FAA). For more information, visit www.veracode.com http://www.veracode.com/



FORTIFY LOGO MED.jpg

Fortify® Software is the leader in the emerging category of Software Security Assurance (SSA). Fortify's SSA products and services protect companies from the threats posed by security flaws in business-critical software applications and result in applications that are inherently more secure and impervious to attack. Our solutions help identify and resolve critical application vulnerabilities in less time and at lower cost. http://www.fortify.com



IBM logo blue high res - small.jpg

IBM Rational® offers Web site security, Web site compliance, and application security solutions for the most comprehensive approach to assessing vulnerabilities in networked applications and critical Web sites. IBM Rational AppScan® and IBM Rational Policy Tester®, Web site security, compliance, and application security solutions, can help you avoid these risks. Our solutions automate application and content analysis. They help you identify vulnerabilities, assess compliance requirements, and improve the accuracy and reliability of online systems.

IBM home page: www.ibm.com/ie

Supported by

Irisss small.jpg IISF.jpg Iia-logo-small.jpgDG horiz col.gif


Agenda

The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing pannel discussions back in the main auditorium both days.

Hamilton Building, TCD - September 17, 2010
Track 1: Synge Theatre Track 2: Salmon Theatre
08:00-09:00 Registration and Coffee
09:00 - 09:10 Welcome to OWASP Ireland 2010 Conference

Eoin Keary, Fabio Cerullo & Rahim Jina 
OWASP Ireland Board

Location: Joly Theatre

09:15 - 10:00 Keynote: "Application Security in the Real World" - Considerations for AppSec in non-security companies.

John Viega  Executive Vice President, Perimeter E-Security

Location: Joly Theatre

10:10 - 10:30

OWASP "State of the Nation"

Eoin KearyDinis Cruz

OWASP Global board members

10:30 - 10:50 Break - Expo
11:00 - 11:35

"Testing the Enterprise E-mail Security - from Software to Cloud-based Services"
Dr. Marian Ventuneac

"Counter Intelligence as Defense: Integrating predictive and proactive attack knowledge as a wall of defense"


Fred Donovan

11:40 - 12:15

"The Evolution of Security Testing: Testing the Resiliency of Security"

David Stubley (GIAC)

"Path to a Secure Application"
Ryan Berg IBM

12:20 - 13:00

"Smart Phones with Dumb Apps"

Dan Cornell  Principal of Denim Group, Ltd.

"Technology and Business Risk Management: How Application Security Fits In!

Peter Perfetti

13:00 - 13:45 Lunch - TCD Dining Hall, buffet Lunch
13:50 - 14:30 Keynote: "The changing face of cryptography"

Professor Fred Piper, BSc, PhD (London), ARCS, DIC, CEng, CMath, FIEE, FIMA, BCS, CISSP, CISM.

Location: Joly Theatre

14:35 - 15:10

"Application Security Scoreboard in the Sky"

Tyler Shields(Veracode)

"Using the OWASP O2 Platform to consume OWASP projects"

Dinis Cruz

15:15 - 15:50

"Microsoft's Security Development Lifecycle for Agile Development"

Nick Coblentz AT&T Consulting

"The "Real" Application Security Pentest."

Rory Alsop& Rory McCune

16:00 - 16:40

"How to Defend Fragile Web Applications"

Vinay Bansal, Martin Nystrom Cisco systems

"Scareware Traversing the World via Ireland"

Mark Hillick

16:50 - 17:50

Keynote: "Hackers and Hollywood: The Implications of the Popular
Media Representation of Computer Hacking"

Damian Gordon Phd, School of Computing Dublin Institute of Technology.

Location: Joly Theatre

17:50 - 18:00 Wrap-Up
18:00-21:00 OWASP Social Gathering


Training

We intend to hold some application security training on the 16/09/2010 the day prior to the event.
This can be booked when booking a ticket to the event.

Secure Application Development: Writing secure code (and testing it)

Trainers:

Eoin Keary  Senior Manager, Ernst & Young, OWASP Board Member

Rahim Jina Senior Consultant, Ernst & Young, OWASP Ireland chapter board.


Abstract
Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand.

Application security is not commonly a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their software development training efforts. This intensive one-day course focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25.  The course will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code.

This course includes coverage of the following areas:

  • Unvalidated Input
  • Injection Flaws
  • Cross-Site Scriping
  • CSRF
  • Authentication & Session Management
  • Access control & Authorisation
  • Broken Caching
  • Error Handling &Resource Management
  • Cryptography
  • Rich Internet Applications
  • The Secure SDLC


Hands on

To cement the principles discussed, students can participate in a number of hands-on security testing exercises where they attack a live web application (i.e., WebGoat etc) that has been seeded with common web application vulnerabilities. The students will use proxy tools commonly used by the hacker community to complete the exercises. Students need to bring their own windows based laptop to participate in the exercises.

Audience

Developers who want to understand the most common web application security flaws, and how to avoid them and code in a secure manner

Level

Intermediate

Prerequisite

Basic knowledge of a web programming language like Java or .NET recommended but not required.

Bringing your own windows based laptop is recommended so you can participate in the hands on exercises.

Duration

Full day - 8 Hours

Registration

Registration is now closed

Travel

By Air


Fly to Dublin Airport: http://www.dublinairport.com/
A taxi or bus can take you into Dublin city. (€30 - Taxi) (€10 - Bus)

Hotels

Recommended Hotel:

A hotel has been block booked in the middle of the city for the OWASP Event in Dublin in September:
http://www.owasp.org/index.php?title=OWASP_IRELAND_2010

The rooms have been booked for the 16th and 17th September and shall be held for OWASP until September 3rd.

Hotel in question is The Morgan Hotel:
http://www.themorgan.com/

Rate - 150 euro per room per night, bed and breakfast

Please quote "Trinity College" and contact hotel reservations 01 6437061 or email reservations@themorgan.com



Trinity College:

Please see here if you wish to stay within the grounds of Trinity College:
http://www.owasp.org/images/2/20/TCD_Tariff_2009.pdf

Hotels Surrounding Trinity College:

http://maps.google.com/maps?near=Dame+Street,+College+Green,+Dublin+2,+Ireland+(Trinity+College+Campus)&geocode=Cfm6cyTmqt_IFev1LQMdLZCg_yFJu3aKhBD7GA&q=hotels&f=l&dq=Trinity+College+loc:+Dublin+Ireland&sll=53.341482,-6.258302&sspn=0.012043,0.037637&ie=UTF8&ei=U6TMSZSzKpSw2QLG_-CUCA&attrid=1036f063d3d0dafc_&ll=53.343711,-6.254568&spn=0.012042,0.037637&z=15


Raffle


Special RAFFLE:
The draw for the Visual Studio 2008 Training raffle took place 3rd September 2010 at the New Horizons Ireland offices in central Dublin.

Alan Deery, Sales Manager at New Horizons Ireland, pulled the winning ticket (http://www.owasp.org/index.php/File:P1050389.JPG)

And the winner is... Chris Adams, please contact Alan Deery or Fabio Cerullo to provide you further details on how to claim your prize.

Congratulations to the winner and a big thank you to everyone who took part.

Photos

To be available soon.


Conference Committee

2010 Ireland Planning Committee Chair:

Eoin Keary - eoin.keary 'at' owasp.org

Fabio Cerullo  - fcerullo 'at' owasp.org

Rahim Jina - rahim.jina 'at' owasp.org