Difference between revisions of "Perth Australia"

Jump to: navigation, search
Line 6: Line 6:
<paypal>Perth Australia</paypal>
<paypal>Perth Australia</paypal>
== Upcoming OWASP Meeting ==
=== Title: TBA ===
==== About the presenter ====
Wade Alcorn is a Principal Security Consultant for NGSSoftware working in all aspects of computer security. He has managed one the largest penetration testing teams in the UK and is currently involved within management in NGS Australia. His technical experience over the past 10 years has ranged from developing/designing PKI and military messaging software, to managing large scale penetration assessments.
Wade has developed various publicly available security tools in areas including browser exploitation frameworks, RFID and BlueTooth. He has produced and presented professional hacking courses for financial and government organisations.
Wade has also published leading papers on emerging threats within Information Security. These have included papers on Inter-protocol Exploitation and Cross-site Scripting Viruses. His Cross-site Scripting Virus paper was the first research to warn of the serious impact this threat would have on the Internet.
'''Date: Wednesday, 11 March 2009'''
'''Location: [http://maps.google.com.au/maps?f=q&source=s_q&hl=en&geocode=&q=edith+cowan+university,+mt+lawley&sll=-25.335448,135.745076&sspn=37.439309,56.25&ie=UTF8&ll=-31.920514,115.872159&spn=0.017412,0.027466&t=h&z=15 Edith Cowan University, Mt Lawley]'''
'''Time: 5:30pm'''
'''RSVP: by 9 March 2009 to [mailto:david.taylor@bankwest.com.au David Taylor]'''
== Previous OWASP Meetings ==
== Previous OWASP Meetings ==

Revision as of 19:08, 8 March 2009

OWASP Perth, Western Australia

Welcome to the Perth, Western Australia chapter homepage. The chapter leaders are:


OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.


Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

<paypal>Perth Australia</paypal>

Previous OWASP Meetings

Threat Modelling in the Software Development Lifecycle (Feb 2009)

One of the most important concepts being promoted in the security industry is security in the software development lifecycle. This concept is important due to two primary factors:

  • It is generally recognised that by shifting security activities closer towards the requirements gathering stage, or the design stage, that less vulnerabilities will make their way into the production systems.
  • It is also recognised that the cost of mitigating vulnerabilities increases later in the lifecycle.

By walking through a case study I hope to demonstrate the effectiveness of addressing risk during the earlier stage of the software development lifecycle, and that these activities are not solely the responsibility of the "security guy", but all participants in a software project including the project manager, business stakeholders and software designer.

About the presenter

Christian Frichot is currently employed by Bankwest working within the Security Consulting Services team. His core responsibilities include phishing and online fraud response, security assessments, information risk assessments and other ad-hoc information security consulting. Christian hopes to spend more time in '09 focusing on education and application security, where he feels more effort needs to be applied.

-Updated 4/03/09 by Christian Frichot