Perth Australia

Revision as of 02:40, 1 September 2009 by Xntrik (talk | contribs) (Updates for upcoming Sep 09 meeting with Shlomi Cohen)

Jump to: navigation, search

OWASP Perth, Western Australia

Welcome to the Perth, Western Australia chapter homepage. The chapter leaders are:


OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.


Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

<paypal>Perth Australia</paypal>

Upcoming OWASP Meeting

Shlomi Cohen of IBM Rational

The OWASP Perth Chapter is excited to announce our next meeting event. This meeting is generously being hosted by IBM, who are providing a venue, catering *and* presenter, Shlomi Cohen. Shlomi works in the IBM Rational business unit and was fundamental in the development of their AppScan suite of products.

Topic: TBA

Date: Monday 7th of September, 2009
Time: 18:00 sign-in, 18:15 start
Location: IBM Building, 1060 Hay St, West Perth, 6005
RSVP: Christian Frichot

Previous OWASP Meetings

Threat Modelling in the Software Development Lifecycle (Feb 2009)

One of the most important concepts being promoted in the security industry is security in the software development lifecycle. This concept is important due to two primary factors:

  • It is generally recognised that by shifting security activities closer towards the requirements gathering stage, or the design stage, that less vulnerabilities will make their way into the production systems.
  • It is also recognised that the cost of mitigating vulnerabilities increases later in the lifecycle.

By walking through a case study I hope to demonstrate the effectiveness of addressing risk during the earlier stage of the software development lifecycle, and that these activities are not solely the responsibility of the "security guy", but all participants in a software project including the project manager, business stakeholders and software designer.

About the presenter

Christian Frichot is currently employed by Bankwest working within the Security Consulting Services team. His core responsibilities include phishing and online fraud response, security assessments, information risk assessments and other ad-hoc information security consulting. Christian hopes to spend more time in '09 focusing on education and application security, where he feels more effort needs to be applied.

-Updated 4/03/09 by Christian Frichot