Difference between revisions of "Switzerland"

From OWASP
Jump to: navigation, search
(Next Meetings: Updated meeting information)
(Past Meetings: add 2015-12-15 meeting)
Line 90: Line 90:
 
! scope="col" | Event
 
! scope="col" | Event
 
! scope="col" | Topic
 
! scope="col" | Topic
 +
 +
|-
 +
| 2015-12-15
 +
| <center>[[Image:info.png|20px|link=http://lists.owasp.org/pipermail/owasp-switzerland/2015-December/000304.html]]</center>
 +
| <center>[[Image:person.png|20px|link=http://intothesymmetry.blogspot.ch/]]<br>[[Image:person.png|20px|link=https://www.xing.com/profile/Pascal_Buchbinder]]</center>
 +
| <center>[[Image:location.png|20px|link=https://www.liip.ch/]]</center>
 +
| <center>to be added</center>
 +
| Chapter Meeting
 +
| Top X OAuth 2 Hacks<br>Reliable log data transfer: about syslog, logstash and log data signing
 
|-
 
|-
 
| 2015-10-14
 
| 2015-10-14

Revision as of 04:56, 16 December 2015


OWASP Switzerland Chapter Logo

Welcome to the Home Page of the OWASP Switzerland Chapter.

  • The chapter leader is Sven Vetsch supported by Antonio Fontes. Please contact us with any questions regarding the chapter.
  • Please subscribe to the mailing list for meeting announcements and other news related to OWASP in Switzerland.
  • You can follow us on Twitter and Facebook


If you're living in the French speaking part of Switzerland, please also visit the OWASP Geneva chapter for more information.

We'd like to invite you to out next OWASP Switzerland meeting. If you want to attend, please make sure to register for the event with your *full name* through register. Space is limited to 50 attendees.

Register button.png

  • When: Tuesday, December 15th 2015
    17:00 | Doors will open
    17:30 – 17:45 | Update on OWASP
    17:50 – 19:00 | Talks
    19:15 – **:** | Dinner
  • What "Top X OAuth 2 Hacks" by Antonio Sanso (Adobe):
    The Web Authorization (OAuth) protocol allows a user to grant a third-party Web site or application access to the user's protected resources, without necessarily revealing their long-term credentials, or even their identity.
    As the web grows, more and more sites rely on distributed services and cloud computing or a third-party application utilizing APIs from multiple services.
    OAuth 2 is widely used from major internet players (as Google, Facebook, Twitter) in order to secure their (also REST) APIs.
    This talk will introduce the OAuth 2 framework and it will show security pitfalls and common implementation mistakes.
  • What "Reliable log data transfer: about syslog, logstash and log data signing” by Pascal Buchbinder:
    Collecting and processing log data has never been so easy as it is today. However, there are still some implementation details to consider in order to ensure that you don't lose any data. Choosing the wrong approach might cause loss of data just in the moment when you need the data most. This short field report shows you the implementation using either rsyslog or logstash for the transport and also shows how log message signatures ensure that detect if anything get lost.
  • Where: Location.png
    Liip AG
    Limmatstrasse 183
    8005 Zurich
  • Who:
    As usual, all of our meetings are open to everyone and free of charge.

Please find below the planned dates for the upcoming OWASP Switzerland Meetings:

Date Info Speaker Location Host Event Topic
2015-12-15
Info.png
Pascal Buchbinder
Antonio Sanso
Location.png
Liip AG Chapter Meeting "Reliable log data transfer: about syslog, logstash and log data signing"
"Top X OAuth 2 Hacks"
Date Info Speaker Host Slides Event Topic
2015-12-15
Info.png
Person.png
Person.png
Location.png
to be added
Chapter Meeting Top X OAuth 2 Hacks
Reliable log data transfer: about syslog, logstash and log data signing
2015-10-14
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Application Security Testing by Static Code Analysis
2015-08-19
Info.png
Person.pngPerson.pngPerson.pngPerson.png
Location.png
Chapter Meeting BarCamp
2015-06-17
Info.png
Person.pngPerson.png
Location.png
Slides.png
Chapter Meeting XSLT Processing Security and Server Side Request Forgeries
2015-04-15
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Android apps in sheep's clothing
2015-02-18
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Abusing JSONP with Rosetta Flash
2014-12-10
Info.png
Person.png
Location.png
Chapter Meeting OWASP Switzerland Fondue
2014-11-12
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Living on the Edge - Advanced ModSecurity to Save Your Ass
2014-08-20
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting (Client-Side) Flash Security
2014-06-17
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting XSS and beyond
2014-04-09
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting SSL/TLS jungle - bringing light into the cipher forest
2014-02-19
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting S-SDLC – Ready for the Cloud?
2013-12-17
Info.png
Person.png
Location.png
Chapter Meeting Annual Review & Outlook
2013-10-22
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Advances in secure (ASP).NET development – Break the hacker's spirit
2013-10-22
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Node.js Security
2013-04-09
Info.png
Person.png
Location.png
Chapter Meeting Tools (not) to use
2012-09-19
Person.png
Location.png
Slides.png
Security-Zone OWASP Top 10 Mobile Risks
2012-06-12
Info.png
Person.png
Location.png
Chapter Meeting Reversing Android Apps
2012-02-14
Info.png
Person.png
Location.png
Chapter Meeting Analysis of the RSA Security Breach
2011-12-13
Info.png
Person.png
Location.png
Chapter Meeting AppSec - Why is it important
2011-12-13
Info.png
Person.pngPerson.png
Location.png
Chapter Meeting Dangers of Firefox Add-On's
2011-10-11
Info.png
Person.png
Location.png
Chapter Meeting Presentation of the OWASP Top 10 & a hands-on session
2011-08-09
Info.png
Person.png
Location.png
Chapter Meeting Foundation of OWASP Switzerland Association
2011-06-14
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Automatic CRL updates for the Apache Web server
2011-06-14
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting New Standards and upcoming Technologies in Browser Security (Slides by Tobias Gondrom)
2011-05-12
Person.png
Location.png
Slides.png
Swiss Cyber Storm III Do you know OWASP?
2011-04-12
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting ASP.NET & ViewState Security
2010-04-12
Info.png
Person.png
Location.png
Chapter Meeting Usability vs. Security
2010-04-12
Info.png
Person.png
Location.png
Chapter Meeting 2-factor authentication for mobile devices: a secure and practical approach
2009-06-25
Info.png
Jerry HoffJason Li
Location.png
Chapter Meeting Benefits of a security API such as ESAPI
2009-06-25
Info.png
Person.png
Location.png
Chapter Meeting Advanced SQL injection exploitation to operating system full control
2009-04-07
Info.png
Person.png
Location.png
Chapter Meeting Open security architecture (www.opensecurityarchitecture.org)
2009-04-07
Info.png
Person.png
Location.png
Chapter Meeting XSRF and JSON hijacking & a hands-on session
2008-09-08
Info.png
Person.png
Location.png
Chapter Meeting Quality of services for web applications (Hands-On Workshop)
2008-09-08
Info.png
Person.png
Location.png
Chapter Meeting XML Security (Hands-On Workshop)
2008-09-08
Info.png
Person.png
Location.png
Chapter Meeting ISC2/Application security
2008-04-01
Info.png
Person.png
Location.png
Global OWASP Week Taking Apache access logs to the next level
2008-04-01
Info.png
Person.png
Location.png
Global OWASP Week Implementing an Application Security Lifecycle programme
2008-04-01
Info.png
Person.png
Location.png
Global OWASP Week WebAppSec the Big Picture
2007-12-11
Info.png
Person.png
Location.png
Chapter Meeting Certified Secure Web
2007-12-11
Info.png
Person.png
Location.png
Chapter Meeting Secure Development Life Cycle
2007-12-11
Info.png
Daniel Hulliger
Location.png
Chapter Meeting Securing my Assets (Presentation & Demo)
2007-09-20
Info.png
Person.png
Location.png
Security-Zone OWASP Testing Guide
2007-09-19
Info.png
Person.png
Location.png
Security-Zone OWASP Top 10
2007-07-24
Info.png
Person.png
Location.png
Chapter Meeting OWASP - An Overview
2007-07-24
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting Dependability for Java Mobile Code
2007-07-24
Info.png
Person.pngPerson.png
Location.png
Chapter Meeting OWASP Top 10 (Demo)
2007-04-26
Info.png
Person.png
Location.png
Chapter Meeting Risk metrics
2007-02-12
Info.png
Person.png
Location.png
Slides.png
Chapter Meeting XSS-Worms
2006-11-11
Person.png
Chapter Meeting OWASP Switzerland Chapter Kick-Off Meeting

OWASP Chapter meetings are free and open. Our chapter's meetings are informal and encourage open discussion of all aspects of application security. Anyone in our area interested in application security is welcome to attend. We encourage attendees to give short presentations about specific topics.


Our main topics are:

  • Security testing
  • Secure development
  • Hacking
  • Secure Architectures


If you would like to give a presentation (make sure that you have read and understood the speaker agreement), or have any questions about the OWASP Switzerland Chapter, send an email to Sven Vetsch.

Help us to make application security visible and become a supporter of the OWASP or our Chapter in Switzerland. All information about becoming a member/sponsor can be found here.

If your company is interested in supporting us directly, please contact Sven Vetsch to talk about the following sponsoring possibilities.

  • Chapter Supporter
  • Single Meeting Supporter
  • Facility Sponsor
  • Organization Supporters (allocating 40% of your annual donation to our Chapter)

Here you can find material related to the OWASP Switzerland Chapter.

OWASP Switzerland bylaws (in German)
Download bylaws

OWASP Switzerland Update Presentation (December 13th 2011)
Download Presentation

<paypal>Switzerland</paypal>

Mailinglist button.png Twitter button.png Facebook button.png